Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

Search Results (207)

Search Parameters:
Keywords = incremental update

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 8471 KiB  
Article
Replay-Based Incremental Learning Framework for Gesture Recognition Overcoming the Time-Varying Characteristics of sEMG Signals
by Xingguo Zhang, Tengfei Li, Maoxun Sun, Lei Zhang, Cheng Zhang and Yue Zhang
Sensors 2024, 24(22), 7198; https://doi.org/10.3390/s24227198 - 10 Nov 2024
Viewed by 438
Abstract
Gesture recognition techniques based on surface electromyography (sEMG) signals face instability problems caused by electrode displacement and the time-varying characteristics of the signals in cross-time applications. This study proposes an incremental learning framework based on densely connected convolutional networks (DenseNet) to capture non-synchronous [...] Read more.
Gesture recognition techniques based on surface electromyography (sEMG) signals face instability problems caused by electrode displacement and the time-varying characteristics of the signals in cross-time applications. This study proposes an incremental learning framework based on densely connected convolutional networks (DenseNet) to capture non-synchronous data features and overcome catastrophic forgetting by constructing replay datasets that store data with different time spans and jointly participate in model training. The results show that, after multiple increments, the framework achieves an average recognition rate of 96.5% from eight subjects, which is significantly better than that of cross-day analysis. The density-based spatial clustering of applications with noise (DBSCAN) algorithm is utilized to select representative samples to update the replayed dataset, achieving a 93.7% recognition rate with fewer samples, which is better than the other three conventional sample selection methods. In addition, a comparison of full dataset training with incremental learning training demonstrates that the framework improves the recognition rate by nearly 1%, exhibits better recognition performance, significantly shortens the training time, reduces the cost of model updating and iteration, and is more suitable for practical applications. This study also investigates the use of the incremental learning of action classes, achieving an average recognition rate of 88.6%, which facilitates the supplementation of action types according to the demand, and further improves the application value of the action pattern recognition technology based on sEMG signals. Full article
Show Figures

Figure 1

Figure 1
<p>Seven classes of gestures.</p>
Full article ">Figure 2
<p>(<b>a</b>) Experimental acquisition equipment. (<b>b</b>) Electrode attachment position.</p>
Full article ">Figure 3
<p>Schematic diagram of action segmentation: (<b>a</b>) Filtered signal. (<b>b</b>) Calculated average energy map. (<b>c</b>) Signal segmentation. (<b>d</b>) Individual segmented signals.</p>
Full article ">Figure 4
<p>(<b>a</b>) A 4-layer dense block with a growth rate of <span class="html-italic">k</span> = 4. (<b>b</b>) The complete framework of the DenseNet model.</p>
Full article ">Figure 5
<p>Diagram of the replay-based incremental learning framework.</p>
Full article ">Figure 6
<p>Class increment mechanism diagram.</p>
Full article ">Figure 7
<p>The clustering of samples with DBSCAN, where blue points are similar and red points are outliers.</p>
Full article ">Figure 8
<p><span class="html-italic">K</span>-fold cross-validation results for single-day dataset of eight subjects.</p>
Full article ">Figure 9
<p>(<b>a</b>) Box plot of accuracy across days. (<b>b</b>) Plot of the linear fit of recognition rate over time span, where the horizontal coordinate indicates the time span.</p>
Full article ">Figure 10
<p>Incremental learning results under different days’ test sets, where the different subplots indicate the number of days in the test set.</p>
Full article ">Figure 11
<p>(<b>a</b>) Comparison of the four data selection methods with fewer samples (<b>b</b>) Comparison of the accuracy of the four methods with different sample sizes.</p>
Full article ">Figure 12
<p>Comparison of training performance using complete data and training using incremental learning, where the bar graph shows the recognition rate and the dotted line graph shows the training time.</p>
Full article ">Figure 13
<p>Summary graph of incremental results for different classes, where the bar chart represents the overall recognition rate and the dotted line chart represents the recognition rate of the incremental classes.</p>
Full article ">
11 pages, 418 KiB  
Article
Fast and Accurate Numerical Integration of the Langevin Equation with Multiplicative Gaussian White Noise
by Mykhaylo Evstigneev and Deniz Kacmazer
Entropy 2024, 26(10), 879; https://doi.org/10.3390/e26100879 - 20 Oct 2024
Viewed by 576
Abstract
A univariate stochastic system driven by multiplicative Gaussian white noise is considered. The standard method for simulating its Langevin equation of motion involves incrementing the system’s state variable by a biased Gaussian random number at each time step. It is shown that the [...] Read more.
A univariate stochastic system driven by multiplicative Gaussian white noise is considered. The standard method for simulating its Langevin equation of motion involves incrementing the system’s state variable by a biased Gaussian random number at each time step. It is shown that the efficiency of such simulations can be significantly enhanced by incorporating the skewness of the distribution of the updated state variable. A new algorithm based on this principle is introduced, and its superior performance is demonstrated using a model of free diffusion of a Brownian particle with a friction coefficient that decreases exponentially with the kinetic energy. The proposed simulation technique proves to be accurate over time steps that are an order of magnitude longer than those required by standard algorithms. The model used to test the new numerical technique is known to exhibit a transition from normal diffusion to superdiffusion as the environmental temperature rises above a certain critical value. A simple empirical formula for the time-dependent diffusion coefficient, which covers both diffusion regimes, is introduced, and its accuracy is confirmed through comparison with the simulation results. Full article
(This article belongs to the Section Statistical Physics)
Show Figures

Figure 1

Figure 1
<p>The second velocity moment obtained by simulating the model in (<a href="#FD24-entropy-26-00879" class="html-disp-formula">24</a>) and (<a href="#FD26-entropy-26-00879" class="html-disp-formula">26</a>) with different time step values <math display="inline"><semantics> <mrow> <mo>Δ</mo> <mi>t</mi> </mrow> </semantics></math> at <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>. Panel (<b>a</b>) shows the results of the simulations accurate to the first order in <math display="inline"><semantics> <mrow> <mo>Δ</mo> <mi>t</mi> </mrow> </semantics></math>, i.e., with terms proportional to <math display="inline"><semantics> <mrow> <mo>Δ</mo> <msup> <mi>t</mi> <mn>2</mn> </msup> </mrow> </semantics></math> removed from Equations (<a href="#FD4-entropy-26-00879" class="html-disp-formula">4</a>), (<a href="#FD7-entropy-26-00879" class="html-disp-formula">7</a>) and (<a href="#FD13-entropy-26-00879" class="html-disp-formula">13</a>). Panel (<b>b</b>) shows the values obtained with the second-order accurate simulations. The standard Gaussian simulations, shown as filled circles, are performed according to the rule (<a href="#FD3-entropy-26-00879" class="html-disp-formula">3</a>). The results obtained according to the new update rule (<a href="#FD9-entropy-26-00879" class="html-disp-formula">9</a>) are shown as open squares.</p>
Full article ">Figure 2
<p>The time-dependent diffusion coefficient for the model (<a href="#FD24-entropy-26-00879" class="html-disp-formula">24</a>), (<a href="#FD26-entropy-26-00879" class="html-disp-formula">26</a>) at temperatures <span class="html-italic">T</span> = 0.1, 0.3, 0.5, 0.7, 0.9, 1.1, and <math display="inline"><semantics> <mrow> <mn>1.5</mn> </mrow> </semantics></math>. Solid colored lines: simulation results obtained by averaging over <math display="inline"><semantics> <msup> <mn>10</mn> <mn>6</mn> </msup> </semantics></math> trajectories. Dashed black lines: fitting with the expression (<a href="#FD32-entropy-26-00879" class="html-disp-formula">32</a>).</p>
Full article ">Figure 3
<p>(<b>a</b>,<b>b</b>) The characteristic time <math display="inline"><semantics> <mi>τ</mi> </semantics></math> and the exponent <math display="inline"><semantics> <mi>α</mi> </semantics></math> from the fit expression (<a href="#FD32-entropy-26-00879" class="html-disp-formula">32</a>), respectively; the lines serve to guide the eye. (<b>c</b>) The long-time limit of the diffusion coefficient at <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>&lt;</mo> <msub> <mi>T</mi> <mi>c</mi> </msub> </mrow> </semantics></math> as found according to Equation (<a href="#FD27-entropy-26-00879" class="html-disp-formula">27</a>) (solid line), and the saturation values of the fit formula (<a href="#FD32-entropy-26-00879" class="html-disp-formula">32</a>), namely, <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>D</mi> <mo>˜</mo> </mover> <mo>∞</mo> </msub> <mo>=</mo> <mi>T</mi> <mi>τ</mi> <mo>/</mo> <mrow> <mo>|</mo> <mi>α</mi> <mo>|</mo> </mrow> </mrow> </semantics></math> (symbols).</p>
Full article ">
18 pages, 3416 KiB  
Article
Path Planning of Inspection Robot Based on Improved Ant Colony Algorithm
by Haixia Wang, Shihao Wang and Tao Yu
Appl. Sci. 2024, 14(20), 9511; https://doi.org/10.3390/app14209511 - 18 Oct 2024
Viewed by 550
Abstract
The conventional Ant Colony Optimization (ACO) algorithm, applied to logistics robot path planning in a two-dimensional grid environment, encounters several challenges: slow convergence rate, susceptibility to local optima, and an excessive number of turning points in the planned paths. To address these limitations, [...] Read more.
The conventional Ant Colony Optimization (ACO) algorithm, applied to logistics robot path planning in a two-dimensional grid environment, encounters several challenges: slow convergence rate, susceptibility to local optima, and an excessive number of turning points in the planned paths. To address these limitations, an improved ant colony algorithm has been developed. First, the heuristic function is enhanced by incorporating artificial potential field (APF) attraction, which introduces the influence of the target point’s attraction on the heuristic function. This modification accelerates convergence and improves the optimization performance of the algorithm. Second, an additional pheromone increment, calculated from the difference in pheromone levels between the best and worst paths of the previous generation, is introduced during the pheromone update process. This adjustment adaptively enhances the path length optimality. Lastly, a triangle pruning method is applied to eliminate unnecessary turning points, reducing the number of turns the logistics robot must execute and ensuring a more direct and efficient path. To validate the effectiveness of the improved algorithm, extensive simulation experiments were conducted in two grid-based environments of varying complexity. Several performance indicators were utilized to compare the conventional ACO algorithm, a previously improved version, and the newly proposed algorithm. MATLAB simulation results demonstrated that the improved ant colony algorithm significantly outperforms the other methods in terms of path length, number of iterations, and the reduction of inflection points, confirming its superiority in logistics robot path planning. Full article
Show Figures

Figure 1

Figure 1
<p>The principle of triangle pruning method.</p>
Full article ">Figure 2
<p>A 20 × 20 algorithm simulation comparison. (<b>a</b>) Path planning of the traditional ant colony algorithm. (<b>b</b>) Convergence curve of the traditional ant colony algorithm. (<b>c</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the ant colony algorithm for path planning. (<b>d</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the convergence curve of the ant colony algorithm. (<b>e</b>) This paper improves the path planning of the ant colony algorithm. (<b>f</b>) This paper improves the convergence curve of the ant colony algorithm.</p>
Full article ">Figure 3
<p>A 30 × 30 algorithm simulation comparison. (<b>a</b>) Path planning of the traditional ant colony algorithm. (<b>b</b>) Convergence curve of the traditional ant colony algorithm. (<b>c</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the ant colony algorithm for path planning. (<b>d</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the convergence curve of the ant colony algorithm. (<b>e</b>) This paper improves the path planning of the ant colony algorithm. (<b>f</b>) This paper improves the convergence curve of the ant colony algorithm.</p>
Full article ">Figure 4
<p>A 50 × 50 algorithm simulation comparison. (<b>a</b>) Path planning of the traditional ant colony algorithm. (<b>b</b>) Convergence curve of the traditional ant colony algorithm. (<b>c</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the ant colony algorithm for path planning. (<b>d</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the convergence curve of the ant colony algorithm. (<b>e</b>) This paper improves the path planning of the ant colony algorithm. (<b>f</b>) This paper improves the convergence curve of the ant colony algorithm.</p>
Full article ">Figure 4 Cont.
<p>A 50 × 50 algorithm simulation comparison. (<b>a</b>) Path planning of the traditional ant colony algorithm. (<b>b</b>) Convergence curve of the traditional ant colony algorithm. (<b>c</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the ant colony algorithm for path planning. (<b>d</b>) Literature [<a href="#B12-applsci-14-09511" class="html-bibr">12</a>] improved the convergence curve of the ant colony algorithm. (<b>e</b>) This paper improves the path planning of the ant colony algorithm. (<b>f</b>) This paper improves the convergence curve of the ant colony algorithm.</p>
Full article ">Figure 5
<p>The ant colony algorithm planning path. (<b>a</b>) The traditional ant colony algorithm planning path. (<b>b</b>) The improved ant colony algorithm planning path.</p>
Full article ">Figure 6
<p>The physical verification of inspection robots.</p>
Full article ">
22 pages, 7052 KiB  
Article
Data-Driven Dynamic Security Partition Assessment of Power Systems Based on Symmetric Electrical Distance Matrix and Chebyshev Distance
by Hang Qi, Ruiyang Su, Runjia Sun and Jiongcheng Yan
Symmetry 2024, 16(10), 1355; https://doi.org/10.3390/sym16101355 - 12 Oct 2024
Viewed by 1158
Abstract
A rapid dynamic security assessment (DSA) is crucial for online preventive and restoration decision-making. The deep learning-based DSA models have high efficiency and accuracy. However, the complex model structure and high training cost make them hard to update quickly. This paper proposes a [...] Read more.
A rapid dynamic security assessment (DSA) is crucial for online preventive and restoration decision-making. The deep learning-based DSA models have high efficiency and accuracy. However, the complex model structure and high training cost make them hard to update quickly. This paper proposes a dynamic security partition assessment method, aiming to develop accurate and incrementally updated DSA models with simple structures. Firstly, the power grid is self-adaptively partitioned into several local regions based on the mean shift algorithm. The input of the mean shift algorithm is a symmetric electrical distance matrix, and the distance metric is the Chebyshev distance. Secondly, high-level features of operating conditions are extracted based on the stacked denoising autoencoder. The symmetric electrical distance matrix is modified to represent fault locations in local regions. Finally, DSA models are constructed for fault locations in each region based on the radial basis function neural network (RBFNN) and Chebyshev distance. An online incremental updating strategy is designed to enhance the model adaptability. With the simulation software PSS/E 33.4.0, the proposed dynamic security partition assessment method is verified in a simplified provincial system and a large-scale practical system in China. Test results demonstrate that the Chebyshev distance can improve the partition quality of the mean shift algorithm by approximately 50%. The RBFNN-based partition assessment model achieves an accuracy of 98.96%, which is higher than the unified assessment with complex models. The proposed incremental updating strategy achieves an accuracy of over 98% and shortens the updating time to 30 s, which can meet the efficiency of online application. Full article
(This article belongs to the Special Issue New Power System and Symmetry)
Show Figures

Figure 1

Figure 1
<p>Diagram of the branch addition method.</p>
Full article ">Figure 2
<p>Diagram of the density center iteration.</p>
Full article ">Figure 3
<p>Node aggregation process considering topological connectivity. (<b>a</b>) Aggregation of 1-level connected nodes; (<b>b</b>) aggregation of 2-level connected nodes; and (<b>c</b>) aggregation of 3-level connected nodes.</p>
Full article ">Figure 4
<p>Diagram of two interconnected local regions.</p>
Full article ">Figure 5
<p>Structure of the RBFNN.</p>
Full article ">Figure 6
<p>Framework of the dynamic security partition assessment.</p>
Full article ">Figure 7
<p>Flow chart of the dynamic security partition assessment.</p>
Full article ">Figure 8
<p>Electrical modularity <span class="html-italic">Q</span><sub>e</sub> under different aggregation thresholds <span class="html-italic">d</span><sub>a</sub>.</p>
Full article ">Figure 9
<p>The number of buses in different regions of a simplified provincial system in China before and after fine-tuning. (<b>a</b>) Before fine-tuning and (<b>b</b>) after fine-tuning.</p>
Full article ">Figure 10
<p>Distributions of partitioned regions.</p>
Full article ">Figure 11
<p>Comparisons of different distance metrics in the mean shift algorithm.</p>
Full article ">Figure 12
<p>Comparisons of partition and unified assessments.</p>
Full article ">Figure 13
<p>The division of samples.</p>
Full article ">Figure 14
<p>The number of buses in different regions of a practical system in China before and after fine-tuning. (<b>a</b>) Before fine-tuning and (<b>b</b>) after fine-tuning.</p>
Full article ">Figure 15
<p>Cluster results in the three-dimensional feature space.</p>
Full article ">Figure 16
<p>Accuracy of the partition and unified assessments based on RBFNN.</p>
Full article ">
21 pages, 2515 KiB  
Article
Online Self-Learning-Based Raw Material Proportioning for Rotary Hearth Furnace and Intelligent Batching System Development
by Xianxia Zhang, Lufeng Wang, Shengjie Tang, Chang Zhao and Jun Yao
Appl. Sci. 2024, 14(19), 9126; https://doi.org/10.3390/app14199126 - 9 Oct 2024
Viewed by 635
Abstract
With the increasing awareness of environmental protection, the rotary hearth furnace system has emerged as a key technology that facilitates a win-win situation for both environmental protection and enterprise economic benefits. This is attributed to its high flexibility in raw material utilization, capability [...] Read more.
With the increasing awareness of environmental protection, the rotary hearth furnace system has emerged as a key technology that facilitates a win-win situation for both environmental protection and enterprise economic benefits. This is attributed to its high flexibility in raw material utilization, capability of directly supplying blast furnaces, low energy consumption, and high zinc removal rate. However, the complexity of the raw material proportioning process coupled with the rotary hearth furnace system’s reliance on human labor results in a time-consuming and inefficient process. This paper innovatively introduces an intelligent formula method for proportioning raw materials based on online clustering algorithms and develops an intelligent batching system for rotary hearth furnaces. Firstly, the ingredients of raw materials undergo data preprocessing, which involves using the local outlier factor (LOF) method to detect any abnormal values, using Kalman filtering to smooth the data, and performing one-hot encoding to represent the different kinds of raw materials. Afterwards, the affinity propagation (AP) clustering method is used to evaluate past data on the ingredients of raw materials and their ratios. This analysis aims to extract information based on human experience with ratios and create a library of machine learning formulas. The incremental AP clustering algorithm is utilized to learn new ratio data and continuously update the machine learning formula library. To ensure that the formula meets the actual production performance requirements of the rotary hearth furnace, the machine learning formula is fine-tuned based on expert experience. The integration of machine learning and expert experience demonstrates good flexibility and satisfactory performance in the practical application of intelligent formulas for rotary hearth furnaces. An intelligent batching system is developed and executed at a steel plant in China. It shows an excellent user interface and significantly enhances batching efficiency and product quality. Full article
(This article belongs to the Special Issue Data Analysis and Mining: New Techniques and Applications)
Show Figures

Figure 1

Figure 1
<p>Overall workflow of intelligent batching system.</p>
Full article ">Figure 2
<p>Schematic diagram for detecting abnormal LOF values in secondary ash from a blast furnace.</p>
Full article ">Figure 3
<p>Schematic diagram of <span class="html-italic">C</span> element filtering in secondary ash from blast furnace.</p>
Full article ">Figure 4
<p>Thenew data points become cluster centers. <span class="html-italic">t</span> is running time.</p>
Full article ">Figure 5
<p>The new data point has not become a cluster center. <span class="html-italic">t</span> is running time.</p>
Full article ">Figure 6
<p>The fine adjustment process.</p>
Full article ">Figure 7
<p>The intelligent batching system executed in a steel plant in China.</p>
Full article ">Figure 8
<p>Batching system interface. TMQ represents the total set material, <math display="inline"><semantics> <msub> <mi>C</mi> <mrow> <mi>s</mi> <mi>u</mi> <mi>m</mi> </mrow> </msub> </semantics></math> represents the total carbon content, <math display="inline"><semantics> <mrow> <mi>Z</mi> <msub> <mi>n</mi> <mrow> <mi>s</mi> <mi>u</mi> <mi>m</mi> </mrow> </msub> </mrow> </semantics></math> represents the total zinc content, <math display="inline"><semantics> <mrow> <mi>c</mi> <msub> <mi>l</mi> <mrow> <mi>s</mi> <mi>u</mi> <mi>m</mi> </mrow> </msub> </mrow> </semantics></math> represents the total chlorine content, and <math display="inline"><semantics> <msub> <mrow> <mi>C</mi> <mi>O</mi> </mrow> <mrow> <mi>s</mi> <mi>u</mi> <mi>m</mi> </mrow> </msub> </semantics></math> represents the current <math display="inline"><semantics> <mrow> <mi>C</mi> <mo>/</mo> <mi>O</mi> </mrow> </semantics></math> ratio.</p>
Full article ">Figure 9
<p>System parameter interface. The index <math display="inline"><semantics> <msub> <mi>x</mi> <mi>i</mi> </msub> </semantics></math> ranges from 1 to 12. The <math display="inline"><semantics> <msub> <mi>x</mi> <mi>i</mi> </msub> </semantics></math> represents the type of material, while the restrictions indicate the various restrictions on material issuance based on the actual situation of the thread for mechanical applications. Warehouse switches indicate whether a flag for the warehouse can be used, as depending on the actual situation, some warehouses may require maintenance or experience other situations, so a warehouse switch is needed. Modifying this switch is performed with a change button that allows for the replacement of materials in the warehouse, thereby expanding its practicality.</p>
Full article ">Figure 10
<p>Parameter interface of ingredient system. <math display="inline"><semantics> <mover> <mi>C</mi> <mo>¯</mo> </mover> </semantics></math> and <math display="inline"><semantics> <munder> <mi>C</mi> <mo>̲</mo> </munder> </semantics></math> represent the upper and lower limits of carbon content, <math display="inline"><semantics> <mover> <mrow> <mi>Z</mi> <mi>n</mi> </mrow> <mo>¯</mo> </mover> </semantics></math> and <math display="inline"><semantics> <munder> <mrow> <mi>Z</mi> <mi>n</mi> </mrow> <mo>̲</mo> </munder> </semantics></math> represent the upper and lower limits of zinc content, <math display="inline"><semantics> <mover> <mrow> <mi>C</mi> <mi>l</mi> </mrow> <mo>¯</mo> </mover> </semantics></math> and <math display="inline"><semantics> <munder> <mrow> <mi>C</mi> <mi>l</mi> </mrow> <mo>̲</mo> </munder> </semantics></math> represent the upper and lower limits of chlorine content, and <math display="inline"><semantics> <mover> <mrow> <mi>C</mi> <mo>/</mo> <mi>O</mi> </mrow> <mo>¯</mo> </mover> </semantics></math> and <math display="inline"><semantics> <munder> <mrow> <mi>C</mi> <mo>/</mo> <mi>O</mi> </mrow> <mo>̲</mo> </munder> </semantics></math> represent the upper and lower limits of the <math display="inline"><semantics> <mrow> <mi>C</mi> <mo>/</mo> <mi>O</mi> </mrow> </semantics></math> ratio.</p>
Full article ">
18 pages, 12186 KiB  
Article
Cloud-Edge Collaborative Defect Detection Based on Efficient Yolo Networks and Incremental Learning
by Zhenwu Lei, Yue Zhang, Jing Wang and Meng Zhou
Sensors 2024, 24(18), 5921; https://doi.org/10.3390/s24185921 - 12 Sep 2024
Viewed by 1019
Abstract
Defect detection constitutes one of the most crucial processes in industrial production. With a continuous increase in the number of defect categories and samples, the defect detection model underpinned by deep learning finds it challenging to expand to new categories, and the accuracy [...] Read more.
Defect detection constitutes one of the most crucial processes in industrial production. With a continuous increase in the number of defect categories and samples, the defect detection model underpinned by deep learning finds it challenging to expand to new categories, and the accuracy and real-time performance of product defect detection are also confronted with severe challenges. This paper addresses the problem of insufficient detection accuracy of existing lightweight models on resource-constrained edge devices by presenting a new lightweight YoloV5 model, which integrates four modules, SCDown, GhostConv, RepNCSPELAN4, and ScalSeq. Here, this paper abbreviates it as SGRS-YoloV5n. Through the incorporation of these modules, the model notably enhances feature extraction and computational efficiency while reducing the model size and computational load, making it more conducive for deployment on edge devices. Furthermore, a cloud-edge collaborative defect detection system is constructed to improve detection accuracy and efficiency through initial detection by edge devices, followed by additional inspection by cloud servers. An incremental learning mechanism is also introduced, enabling the model to adapt promptly to new defect categories and update its parameters accordingly. Experimental results reveal that the SGRS-YoloV5n model exhibits superior detection accuracy and real-time performance, validating its value and stability for deployment in resource-constrained environments. This system presents a novel solution for achieving efficient and accurate real-time defect detection. Full article
Show Figures

Figure 1

Figure 1
<p>Cloud-edge collaborative defect inspection system.</p>
Full article ">Figure 2
<p>Structure of SGRS-YoloV5n (The model proposed in the article is abbreviated as SGRS-YoloV5n because it is based on the YoloV5n model and combines SCDown, GhostConv, RepNCSPELAN4, and ScalSeq in the backbone and neck parts.).</p>
Full article ">Figure 3
<p>Structure of GhostConv.</p>
Full article ">Figure 4
<p>Structure of C3Ghost.</p>
Full article ">Figure 5
<p>Structure of SCDown.</p>
Full article ">Figure 6
<p>Structure of RepNCSPELAN4.</p>
Full article ">Figure 7
<p>Structure of ScalSeq.</p>
Full article ">Figure 8
<p>Cloud-edge collaborative defect detection platform.</p>
Full article ">Figure 9
<p>Examples of PCB defect types: (<b>a</b>) A defect where a necessary hole is missing. (<b>b</b>) Small indentations or nibbles on the PCB edge. (<b>c</b>) A break in the circuit where continuity is lost. (<b>d</b>) A defect caused by unintended connections between conductive parts. (<b>e</b>) An extraneous copper connection leading to an undesired short. (<b>f</b>) Unwanted copper residues left on the PCB.</p>
Full article ">Figure 10
<p>SGRS-YoloV5n and YoloV5n training comparison.</p>
Full article ">Figure 11
<p>Confusion matrixb comparison. (<b>a</b>) Training confusion matrix of Yolov5n; (<b>b</b>) training confusion matrix of SGRS-Yolov5n.</p>
Full article ">Figure 11 Cont.
<p>Confusion matrixb comparison. (<b>a</b>) Training confusion matrix of Yolov5n; (<b>b</b>) training confusion matrix of SGRS-Yolov5n.</p>
Full article ">Figure 12
<p>Detection of defect results. (<b>a</b>) Detected missing holes with confidence scores of 0.77 and 0.86. (<b>b</b>) Detected mouse bites with confidence scores of 0.77 and 0.72. (<b>c</b>) Detected open circuits with confidence scores of 0.81 and 0.78. (<b>d</b>) Detected shorts with confidence scores of 0.85 and 0.89. (<b>e</b>) Detected spurs with confidence scores of 0.82 and 0.60. (<b>f</b>) Detected spurious copper with confidence scores of 0.74 and 0.80.</p>
Full article ">Figure 13
<p>Real-time detection results for edge devices.</p>
Full article ">Figure 14
<p>Before and after cloud detecting. (<b>a</b>) Original image taken by edge device before cloud processing. (<b>b</b>) Detection results after cloud-based processing. The system accurately detects missing holes with confidence scores of 0.71 and 0.69, and a spur with a confidence score of 0.84.</p>
Full article ">Figure 15
<p>Before and after cloud detecting. (<b>a</b>) Original defect characteristics; (<b>b</b>) new defective features.</p>
Full article ">
62 pages, 1897 KiB  
Review
Construction of Knowledge Graphs: Current State and Challenges
by Marvin Hofer, Daniel Obraczka, Alieh Saeedi, Hanna Köpcke and Erhard Rahm
Information 2024, 15(8), 509; https://doi.org/10.3390/info15080509 - 22 Aug 2024
Cited by 3 | Viewed by 3983
Abstract
With Knowledge Graphs (KGs) at the center of numerous applications such as recommender systems and question-answering, the need for generalized pipelines to construct and continuously update such KGs is increasing. While the individual steps that are necessary to create KGs from unstructured sources [...] Read more.
With Knowledge Graphs (KGs) at the center of numerous applications such as recommender systems and question-answering, the need for generalized pipelines to construct and continuously update such KGs is increasing. While the individual steps that are necessary to create KGs from unstructured sources (e.g., text) and structured data sources (e.g., databases) are mostly well researched for their one-shot execution, their adoption for incremental KG updates and the interplay of the individual steps have hardly been investigated in a systematic manner so far. In this work, we first discuss the main graph models for KGs and introduce the major requirements for future KG construction pipelines. Next, we provide an overview of the necessary steps to build high-quality KGs, including cross-cutting topics such as metadata management, ontology development, and quality assurance. We then evaluate the state of the art of KG construction with respect to the introduced requirements for specific popular KGs, as well as some recent tools and strategies for KG construction. Finally, we identify areas in need of further research and improvement. Full article
(This article belongs to the Special Issue Knowledge Graph Technology and its Applications II)
Show Figures

Figure 1

Figure 1
<p>Simplified Knowledge Graph (KG) example demonstrating integrated information from five domains, showcasing ten entities of eight types connected by twelve relationships (two distinct is-a relations). Dashed lines indicate semantic structures (ontology or graph schema), such as entity types. Inferences can be made based on the relationships and typing, revealing additional information such as the broader birthplace of Aphex Twin being Ireland and Xtal belonging to the Techno genre (Not all possible inferences are shown for clarity).</p>
Full article ">Figure 2
<p>Incremental knowledge graph construction pipeline.</p>
Full article ">Figure 3
<p>Ontology and entity merging strategies.</p>
Full article ">Figure 4
<p>Knowledge extraction steps for an example sentence linking entities and relations to the DBpedia KG. Recognized named entities are highlighted in green.</p>
Full article ">Figure 5
<p>Incremental entity-resolution workflow.</p>
Full article ">
23 pages, 3682 KiB  
Article
Adaptive Incremental Nonlinear Dynamic Inversion Control for Aerial Manipulators
by Chanhong Park, Alex Ramirez-Serrano and Mahdis Bisheban
Aerospace 2024, 11(8), 671; https://doi.org/10.3390/aerospace11080671 - 15 Aug 2024
Cited by 1 | Viewed by 898
Abstract
This paper proposes an adaptive incremental nonlinear dynamic inversion (INDI) controller for unmanned aerial manipulators (UAMs). A novel adaptive law is employed to enable aerial manipulators to manage the inertia parameter changes that occur when the manipulator moves or picks up unknown objects [...] Read more.
This paper proposes an adaptive incremental nonlinear dynamic inversion (INDI) controller for unmanned aerial manipulators (UAMs). A novel adaptive law is employed to enable aerial manipulators to manage the inertia parameter changes that occur when the manipulator moves or picks up unknown objects during any phase of the UAM’s flight maneuver. The adaptive law utilizes a Kalman filter to estimate a set of weighting factors employed to adjust the control gain matrix of a previously developed INDI control law formulated for the corresponding UAV (no manipulator included). The proposed adaptive control scheme uses acceleration and actuator input measurements of the UAV without necessitating any knowledge about the manipulator, its movements, or the objects being grasped, thus enabling the use of previously developed INDI UAV controllers for UAMs. The algorithm is validated through simulations demonstrating that the adaptive control gain matrix used in the UAV’s INDI controller is promptly updated based on the UAM maneuvers, resulting in effective UAV and robot arm control. Full article
(This article belongs to the Special Issue Challenges and Innovations in Aircraft Flight Control)
Show Figures

Figure 1

Figure 1
<p>The Navig8-UAV and hypothetical Navig8-UAM: (<b>a</b>) The Navig8-UAV; (<b>b</b>) The hypothetical Navig8-UAM.</p>
Full article ">Figure 2
<p>Schematic diagram of the Navig8-UAM.</p>
Full article ">Figure 3
<p>Block diagram of the proposed adaptive INDI controller for UAMs.</p>
Full article ">Figure 4
<p>Manipulator poses during the simulation.</p>
Full article ">Figure 5
<p>Joint angles of the manipulator during the simulation.</p>
Full article ">Figure 6
<p>Position and attitude control of the UAV during the simulation: (<b>a</b>) UAV position control in the east direction; (<b>b</b>) UAV position control in the north direction; (<b>c</b>) UAV position control in the upward direction; (<b>d</b>) UAV roll angle control; (<b>e</b>) UAV pitch angle control; (<b>f</b>) UAV yaw angle control.</p>
Full article ">Figure 7
<p>Acceleration control of the UAV during the simulation: (<b>a</b>) UAV angular acceleration control in the x direction of the UAV frame; (<b>b</b>) UAV angular acceleration control in the y direction of the UAV frame; (<b>c</b>) UAV angular acceleration control in the z direction of the UAV frame; (<b>d</b>) UAV linear acceleration control in the x direction of the UAV frame; (<b>e</b>) UAV linear acceleration control in the y direction of the UAV frame; (<b>f</b>) UAV linear acceleration control in the z direction of the UAV frame.</p>
Full article ">Figure 8
<p>Components of the inverse control effectiveness matrix during the simulation: (<b>a</b>) 1st column of the adapted <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>b</b>) 1st column of the true <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>c</b>) 2nd column of the adapted <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>d</b>) 2nd column of the true <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>e</b>) 3rd column of the adapted <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>f</b>) 3rd column of the true <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>g</b>) 4th column of the adapted <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>h</b>) 4th column of the true <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>i</b>) 5th column of the adapted <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>; (<b>j</b>) 5th column of the true <math display="inline"><semantics> <msup> <mi>G</mi> <mrow> <mo>−</mo> <mn>1</mn> </mrow> </msup> </semantics></math>.</p>
Full article ">Figure 9
<p>Side view of the helical trajectory achieved by the UAM.</p>
Full article ">Figure 10
<p>Top view of the helical trajectory achieved by the UAM.</p>
Full article ">Figure 11
<p>Attitude control errors during the helical trajectory tracking simulation: (<b>a</b>) roll angle control error; (<b>b</b>) pitch angle control error; (<b>c</b>) yaw angle control error.</p>
Full article ">
12 pages, 1184 KiB  
Article
Incremental Learning for LiDAR Attack Recognition Framework in Intelligent Driving Using Gaussian Processes
by Zujia Miao, Cuiping Shao, Huiyun Li and Yunduan Cui
World Electr. Veh. J. 2024, 15(8), 362; https://doi.org/10.3390/wevj15080362 - 12 Aug 2024
Viewed by 700
Abstract
The perception system plays a crucial role by integrating LiDAR and various sensors to perform localization and object detection, which ensures the security of intelligent driving. However, existing research indicates that LiDAR is vulnerable to sensor attacks, which lead to inappropriate driving strategies [...] Read more.
The perception system plays a crucial role by integrating LiDAR and various sensors to perform localization and object detection, which ensures the security of intelligent driving. However, existing research indicates that LiDAR is vulnerable to sensor attacks, which lead to inappropriate driving strategies and need effective attack recognition methods. Previous LiDAR attack recognition methods rely on fixed anomaly thresholds obtained from depth map data distributions in specific scenarios as static anomaly boundaries, which lead to reduced accuracy, increased false alarm rates, and a lack of performance stability. To address these problems, we propose an adaptive LiDAR attack recognition framework capable of adjusting to different driving scenarios. This framework initially models the perception system by integrating the vehicle dynamics model and object tracking algorithms to extract data features, subsequently employing Gaussian Processes for the probabilistic modeling of these features. Finally, the framework employs sparsification computing techniques and a sliding window strategy to continuously update the Gaussian Process model with window data, which achieves incremental learning that generates uncertainty estimates as dynamic anomaly boundaries to recognize attacks. The performance of the proposed framework has been evaluated extensively using the real-world KITTI dataset covering four driving scenarios. Compared to previous methods, our framework achieves a 100% accuracy rate and a 0% false positive rate in the localization system, and an average increase of 3.43% in detection accuracy in the detection system across the four scenarios, which demonstrates superior adaptive capabilities. Full article
(This article belongs to the Special Issue Design Theory, Method and Control of Intelligent and Safe Vehicles)
Show Figures

Figure 1

Figure 1
<p>LiDAR replay attack and LiDAR spoofing attack.</p>
Full article ">Figure 2
<p>Problem statement.</p>
Full article ">Figure 3
<p>Architecture of the proposed framework.</p>
Full article ">Figure 4
<p>The combination of sliding window and sparse Gaussian Process.</p>
Full article ">Figure 5
<p>Driving scenarios in intelligence driving.</p>
Full article ">Figure 6
<p>Experimental result of proposed framework in localization system under LiDAR replay attack.</p>
Full article ">Figure 7
<p>Experimental result of proposed framework in detection system under LiDAR spoofing attack.</p>
Full article ">Figure 8
<p>Adaptive analysis of proposed framework.</p>
Full article ">
37 pages, 16212 KiB  
Article
A Multi-Strategy Improvement Secretary Bird Optimization Algorithm for Engineering Optimization Problems
by Song Qin, Junling Liu, Xiaobo Bai and Gang Hu
Biomimetics 2024, 9(8), 478; https://doi.org/10.3390/biomimetics9080478 - 8 Aug 2024
Viewed by 1237
Abstract
Based on a meta-heuristic secretary bird optimization algorithm (SBOA), this paper develops a multi-strategy improvement secretary bird optimization algorithm (MISBOA) to further enhance the solving accuracy and convergence speed for engineering optimization problems. Firstly, a feedback regulation mechanism based on incremental PID control [...] Read more.
Based on a meta-heuristic secretary bird optimization algorithm (SBOA), this paper develops a multi-strategy improvement secretary bird optimization algorithm (MISBOA) to further enhance the solving accuracy and convergence speed for engineering optimization problems. Firstly, a feedback regulation mechanism based on incremental PID control is used to update the whole population according to the output value. Then, in the hunting stage, a golden sinusoidal guidance strategy is employed to enhance the success rate of capture. Meanwhile, to keep the population diverse, a cooperative camouflage strategy and an update strategy based on cosine similarity are introduced into the escaping stage. Analyzing the results in solving the CEC2022 test suite, the MISBOA both get the best comprehensive performance when the dimensions are set as 10 and 20. Especially when the dimension is increased, the advantage of MISBOA is further expanded, which ranks first on 10 test functions, accounting for 83.33% of the total. It illustrates the introduction of improvement strategies that effectively enhance the searching accuracy and stability of MISBOA for various problems. For five real-world optimization problems, the MISBOA also has the best performance on the fitness values, indicating a stronger searching ability with higher accuracy and stability. Finally, when it is used to solve the shape optimization problem of the combined quartic generalized Ball interpolation (CQGBI) curve, the shape can be designed to be smoother according to the obtained parameters based on MISBOA to improve power generation efficiency. Full article
(This article belongs to the Special Issue Nature-Inspired Metaheuristic Optimization Algorithms 2024)
Show Figures

Figure 1

Figure 1
<p>The classification of MHAs.</p>
Full article ">Figure 2
<p>The motivation of this paper.</p>
Full article ">Figure 3
<p>The modeling process of searching for prey.</p>
Full article ">Figure 4
<p>The modeling process of consuming prey.</p>
Full article ">Figure 5
<p>The modeling process of attacking prey.</p>
Full article ">Figure 6
<p>The modeling process of camouflage based on environment.</p>
Full article ">Figure 7
<p>The modeling process of running mode.</p>
Full article ">Figure 8
<p>The flowchart of the SBOA algorithm.</p>
Full article ">Figure 9
<p>Schematic diagram of the incremental PID control.</p>
Full article ">Figure 10
<p>The flowchart of the MISBOA algorithm.</p>
Full article ">Figure 11
<p>The radar comparison maps between MISBOA and other algorithms on CEC2022 with 10 dimensions.</p>
Full article ">Figure 12
<p>The average iterative curves of different algorithms on CEC2022 with 10 dimensions.</p>
Full article ">Figure 13
<p>The radar comparison maps between MISBOA and other algorithms on CEC2022 with 20 dimensions.</p>
Full article ">Figure 14
<p>The average iterative curves of different algorithms on CEC2022 with 20 dimensions.</p>
Full article ">Figure 15
<p>The statistical results of ranking on CEC2022 with 10 and 20 dimensions.</p>
Full article ">Figure 16
<p>The construction of step-cone pulley design.</p>
Full article ">Figure 17
<p>The construction of the planetary gear train design.</p>
Full article ">Figure 18
<p>The construction of the robot gripper design.</p>
Full article ">Figure 19
<p>The construction of the four-stage gearbox design problem.</p>
Full article ">Figure 20
<p>The best results for TSP with 80 cities and 2 traveling salesman.</p>
Full article ">Figure 20 Cont.
<p>The best results for TSP with 80 cities and 2 traveling salesman.</p>
Full article ">Figure 21
<p>The shape of wind-driven generator blades.</p>
Full article ">Figure 22
<p>The best design for wind-driven generator blades according to the best solutions of various algorithms.</p>
Full article ">Figure 22 Cont.
<p>The best design for wind-driven generator blades according to the best solutions of various algorithms.</p>
Full article ">
18 pages, 2451 KiB  
Article
HRP-OG: Online Learning with Generative Feature Replay for Hypertension Risk Prediction in a Nonstationary Environment
by Shaofu Lin, Haokang Yan, Shiwei Zhou, Ziqian Qiao and Jianhui Chen
Sensors 2024, 24(15), 5033; https://doi.org/10.3390/s24155033 - 3 Aug 2024
Viewed by 959
Abstract
Hypertension is a major risk factor for many serious diseases. With the aging population and lifestyle changes, the incidence of hypertension continues to rise, imposing a significant medical cost burden on patients and severely affecting their quality of life. Early intervention can greatly [...] Read more.
Hypertension is a major risk factor for many serious diseases. With the aging population and lifestyle changes, the incidence of hypertension continues to rise, imposing a significant medical cost burden on patients and severely affecting their quality of life. Early intervention can greatly reduce the prevalence of hypertension. Research on hypertension early warning models based on electronic health records (EHRs) is an important and effective method for achieving early hypertension warning. However, limited by the scarcity and imbalance of multivisit records, and the nonstationary characteristics of hypertension features, it is difficult to predict the probability of hypertension prevalence in a patient effectively. Therefore, this study proposes an online hypertension monitoring model (HRP-OG) based on reinforcement learning and generative feature replay. It transforms the hypertension prediction problem into a sequential decision problem, achieving risk prediction of hypertension for patients using multivisit records. Sensors embedded in medical devices and wearables continuously capture real-time physiological data such as blood pressure, heart rate, and activity levels, which are integrated into the EHR. The fit between the samples generated by the generator and the real visit data is evaluated using maximum likelihood estimation, which can reduce the adversarial discrepancy between the feature space of hypertension and incoming incremental data, and the model is updated online based on real-time data using generative feature replay. The incorporation of sensor data ensures that the model adapts dynamically to changes in the condition of patients, facilitating timely interventions. In this study, the publicly available MIMIC-III data are used for validation, and the experimental results demonstrate that compared to existing advanced methods, HRP-OG can effectively improve the accuracy of hypertension risk prediction for few-shot multivisit record in nonstationary environments. Full article
(This article belongs to the Special Issue Artificial Intelligence for Medical Sensing)
Show Figures

Figure 1

Figure 1
<p>Distribution of age over 5 years. (<b>a</b>) Distribution of age in hospital 1; (<b>b</b>) distribution of age in hospital 2.</p>
Full article ">Figure 2
<p>The whole framework of HRP-OG.</p>
Full article ">Figure 3
<p>Distribution of characteristics over 12 years. (<b>a</b>) Distribution of age over 12 years; (<b>b</b>) distribution of diastolic blood pressure over 12 years; (<b>c</b>) distribution of systolic blood pressure over 12 years; (<b>d</b>) distribution of weight over 12 years.</p>
Full article ">Figure 4
<p>Accuracy value of ablation experiments.</p>
Full article ">Figure 5
<p>PR-AUC value of ablation experiments.</p>
Full article ">Figure 6
<p>ROC curve of ablation experiments.</p>
Full article ">
17 pages, 3299 KiB  
Article
WI-TMLEGA: Weight Initialization and Training Method Based on Entropy Gain and Learning Rate Adjustment
by Hongchuan Tang, Zhongguo Li, Qi Wang and Wenbin Fan
Entropy 2024, 26(8), 614; https://doi.org/10.3390/e26080614 - 23 Jul 2024
Viewed by 855
Abstract
Addressing the issues of prolonged training times and low recognition rates in large model applications, this paper proposes a weight training method based on entropy gain for weight initialization and dynamic adjustment of the learning rate using the multilayer perceptron (MLP) model as [...] Read more.
Addressing the issues of prolonged training times and low recognition rates in large model applications, this paper proposes a weight training method based on entropy gain for weight initialization and dynamic adjustment of the learning rate using the multilayer perceptron (MLP) model as an example. Initially, entropy gain was used to replace random initial values for weight initialization. Subsequently, an incremental learning rate strategy was employed for weight updates. The model was trained and validated using the MNIST handwritten digit dataset. The experimental results showed that, compared to random initialization, the proposed initialization method improves training effectiveness by 39.8% and increases the maximum recognition accuracy by 8.9%, demonstrating the feasibility of this method in large model applications. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

Figure 1
<p>Model structure diagram illustrating the MLP network structure used.</p>
Full article ">Figure 2
<p>Schematic diagram of information displaying the specific locations of weights in the network connections.</p>
Full article ">Figure 3
<p>Learning rate change curve.</p>
Full article ">Figure 4
<p>Dataset preprocessing flowchart showing the preprocessing workflow applied to the dataset used in this study.</p>
Full article ">Figure 5
<p>Comparison of convergence speed before and after weight initialization improvement. The blue and red weight convergence curves correspond to the left vertical axis, while the light blue and gray accuracy curves correspond to the right vertical axis. The maximum accuracy value indicates that the model has found the optimal weights for the current iteration.</p>
Full article ">Figure 6
<p>Area under the weight convergence speed curve. “<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>A</mi> </mrow> <mrow> <mn>1</mn> </mrow> </msub> </mrow> </semantics></math>” represents the area enclosed by the weight mean convergence curve and the horizontal axis when using the WI-TMLEGA method for weight initialization. “<math display="inline"><semantics> <mrow> <msub> <mrow> <mi>A</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msub> </mrow> </semantics></math>” represents the area enclosed by the weight mean convergence curve using the RI method for weight initialization and the curve using the WI-TMLEGA method, which indicates the improved convergence efficiency provided by the WI-TMLEGA method.</p>
Full article ">Figure 7
<p>The WI-TMLEGA method’s performance comparison across different datasets is as follows: the first chart depicts the MNIST dataset used in this study; the second chart illustrates the USPS dataset, featuring handwritten digits primarily utilized for postal-service-related automatic recognition and classification tasks; and the third chart displays the SVHN dataset, comprising digit images extracted from Google Street View, with each image containing one or multiple digits, used as a benchmark for multi-digit classification and localization tasks.</p>
Full article ">Figure 7 Cont.
<p>The WI-TMLEGA method’s performance comparison across different datasets is as follows: the first chart depicts the MNIST dataset used in this study; the second chart illustrates the USPS dataset, featuring handwritten digits primarily utilized for postal-service-related automatic recognition and classification tasks; and the third chart displays the SVHN dataset, comprising digit images extracted from Google Street View, with each image containing one or multiple digits, used as a benchmark for multi-digit classification and localization tasks.</p>
Full article ">Figure 8
<p>Comparison between WI-TMLEGA method and other initialization methods. The accuracy of the model was assessed using five common initialization methods. A larger value indicates higher accuracy.</p>
Full article ">Figure 9
<p>Comparison of three learning rate change strategies. (<b>A</b>) The accuracy curve of the model using a learning rate increment function steadily rises between 0.95 and 1. (<b>B</b>) The accuracy curve of the model using a learning rate decrement function gradually decreases to around 0.98 after the seventh iteration. (<b>C</b>) The accuracy curve of the model using a fixed learning rate function, although steadily increasing throughout, starts with an initial accuracy of only 0.98. Through a comparison using the same dataset, it is evident that the model using a learning rate increment function can effectively improve accuracy.</p>
Full article ">
19 pages, 2582 KiB  
Article
Application of Local Search Particle Swarm Optimization Based on the Beetle Antennae Search Algorithm in Parameter Optimization
by Teng Feng, Shuwei Deng, Qianwen Duan and Yao Mao
Actuators 2024, 13(7), 270; https://doi.org/10.3390/act13070270 - 17 Jul 2024
Viewed by 978
Abstract
Intelligent control algorithms have been extensively utilized for adaptive controller parameter adjustment. While the Particle Swarm Optimization (PSO) algorithm has several issues: slow convergence speed requiring a large number of iterations, a tendency to get trapped in local optima, and difficulty escaping from [...] Read more.
Intelligent control algorithms have been extensively utilized for adaptive controller parameter adjustment. While the Particle Swarm Optimization (PSO) algorithm has several issues: slow convergence speed requiring a large number of iterations, a tendency to get trapped in local optima, and difficulty escaping from them. It is also sensitive to the distribution of the solution space, where uneven distribution can lead to inefficient contraction. On the other hand, the Beetle Antennae Search (BAS) algorithm is robust, precise, and has strong global search capabilities. However, its limitation lies in focusing on a single individual. As the number of iterations increases, the step size decays, causing it to get stuck in local extrema and preventing escape. Although setting a fixed or larger initial step size can avoid this, it results in poor stability. The PSO algorithm, which targets a population, can help the BAS algorithm increase diversity and address its deficiencies. Conversely, the characteristics of the BAS algorithm can aid the PSO algorithm in finding the optimal solution early in the optimization process, accelerating convergence. Therefore, considering the combination of BAS and PSO algorithms can leverage their respective advantages and enhance overall algorithm performance. This paper proposes an improved algorithm, W-K-BSO, which integrates the Beetle Antennae Search strategy into the local search phase of PSO. By leveraging chaotic mapping, the algorithm enhances population diversity and accelerates convergence speed. Additionally, the adoption of linearly decreasing inertia weight enhances algorithm performance, while the coordinated control of the contraction factor and inertia weight regulates global and local optimization performance. Furthermore, the influence of beetle antennae position increments on particles is incorporated, along with the establishment of new velocity update rules. Simulation experiments conducted on nine benchmark functions demonstrate that the W-K-BSO algorithm consistently exhibits strong optimization capabilities. It significantly improves the ability to escape local optima, convergence precision, and algorithm stability across various dimensions, with enhancements ranging from 7 to 9 orders of magnitude compared to the BAS algorithm. Application of the W-K-BSO algorithm to PID optimization for the Pointing and Tracking System (PTS) reduced system stabilization time by 28.5%, confirming the algorithm’s superiority and competitiveness. Full article
Show Figures

Figure 1

Figure 1
<p>Flow chart of the PSO algorithm.</p>
Full article ">Figure 2
<p>Flow chart of the BAS algorithm.</p>
Full article ">Figure 3
<p>Flow chart of the W-K-BSO algorithm.</p>
Full article ">Figure 4
<p>Evolutionary curves of the test functions.</p>
Full article ">Figure 5
<p>PTS subsystem.</p>
Full article ">Figure 6
<p>Optimization curves of the W-K-BSO algorithm.</p>
Full article ">Figure 7
<p>The step response and error curves obtained using the PID parameters optimized by the W-K-BSO algorithm.</p>
Full article ">Figure 8
<p>The step response and error curves obtained using the PID parameters optimized by the W-K-BSO algorithm. (<b>a</b>) The comparison of the step response; (<b>b</b>) The comparison of the step response output error.</p>
Full article ">
25 pages, 4444 KiB  
Article
Mining Abnormal Patterns in Moving Target Trajectories Based on Multi-Attribute Classification
by Bin Xie, Hui Guo and Guo Zheng
Mathematics 2024, 12(13), 1924; https://doi.org/10.3390/math12131924 - 21 Jun 2024
Cited by 1 | Viewed by 608
Abstract
As a type of time series data, trajectory data objectively record the location information and corresponding time information of an object’s activities. It not only describes the spatial activity trajectory of a moving object but also contains the unique attributes, states, and behavioral [...] Read more.
As a type of time series data, trajectory data objectively record the location information and corresponding time information of an object’s activities. It not only describes the spatial activity trajectory of a moving object but also contains the unique attributes, states, and behavioral characteristics of the moving object itself. It can also reflect the interaction relationship between the object’s activities and various elements in the environment to a certain extent. Therefore, mining from moving target trajectory data to discover implicit, effective, and potentially useful spatiotemporal behavior patterns of moving targets, such as anomaly detection, will have significant research significance. This paper proposes a method for mining abnormal patterns in the trajectory of moving targets based on multi-attribute classification. Firstly, to explore the activity location patterns of single moving targets, a frequent sequence discovery method for moving targets based on sequence patterns is proposed. Furthermore, for moving target trajectory data sets containing multiple attributes, numerical attributes are extracted, and the data are clustered according to attribute classification to extract a set of normal behavior patterns of moving targets. Then, combining the activity location patterns and normal behavior patterns of the moving target, the original trajectory data are compared with them to achieve the goal of detecting abnormal behavior of the moving target. Finally, an incremental anomaly detection scheme is proposed to address the characteristics of fast updates and large numbers of data in trajectory data sets. This involves synchronously updating the frequency of moving target activity patterns and the range of values for normal behavior patterns while updating the trajectory data set, in order to meet the needs of database updates and improve the accuracy and credibility of results. Full article
Show Figures

Figure 1

Figure 1
<p>Projection database with prefix length 1.</p>
Full article ">Figure 2
<p>Projection database with prefix length 2.</p>
Full article ">Figure 3
<p>Flowchart of mining method for frequent activity region sequence of moving targets.</p>
Full article ">Figure 4
<p>Canopy clustering algorithm process.</p>
Full article ">Figure 5
<p>Canopy algorithm rendering.</p>
Full article ">Figure 6
<p>Flow chart for mining numerical anomaly patterns in moving target trajectory.</p>
Full article ">Figure 7
<p>Sample data set data for co-occurrence pattern mining results.</p>
Full article ">Figure 8
<p>Visualization of co-occurrence pattern mining results.</p>
Full article ">Figure 9
<p>Example of frequently active area sequence result data set.</p>
Full article ">Figure 10
<p>Results of mining method for abnormal patterns of moving target passing through regions.</p>
Full article ">Figure 11
<p>The results of the mining method for abnormal patterns of average speed of moving targets.</p>
Full article ">
10 pages, 3152 KiB  
Article
The ‘Radiant Effect’: Recent Sonographic Image-Enhancing Technique and Its Impact on Nuchal Translucency Measurements
by Arne Bergsch, Jan Degenhardt, Rüdiger Stressig, Heiko Dudwiesus, Oliver Graupner and Jochen Ritgen
J. Clin. Med. 2024, 13(12), 3625; https://doi.org/10.3390/jcm13123625 - 20 Jun 2024
Viewed by 701
Abstract
Background: This study assesses the effects of the ‘Radiant’ image enhancement technique on fetal nuchal translucency (NT) measurements during first-trimester sonographic exams. Methods: A retrospective analysis of 263 ultrasound images of first-trimester midsagittal sections was conducted. NT measurements were obtained using [...] Read more.
Background: This study assesses the effects of the ‘Radiant’ image enhancement technique on fetal nuchal translucency (NT) measurements during first-trimester sonographic exams. Methods: A retrospective analysis of 263 ultrasound images of first-trimester midsagittal sections was conducted. NT measurements were obtained using a semi-automatic tool. Statistical methods were applied to compare NT measurements with and without ‘Radiant’ enhancement. An in vitro setup with predefined line distances provided additional data. Results: Incremental increases in NT measurements were observed with varying levels of ‘Radiant’ application: an average increase of 0.19 mm with ‘Radiant min’, 0.24 mm with ‘Radiant mid’, and 0.30 mm with ‘Radiant max.’ The in vitro results supported these findings, showing consistent effects on line thickness and measurement accuracy, with the smallest mean deviation occurring at the ‘Radiant mid’ setting. Conclusions: ‘Radiant’ image enhancement leads to significant increases in NT measurements. To avoid systematic biases in clinical assessments, it is advisable to disable ‘Radiant’ during NT measurement procedures. Further studies are necessary to corroborate these findings and to consider updates to the NT reference tables based on this technology. Full article
(This article belongs to the Special Issue Advances in Prenatal Diagnosis and Maternal Fetal Medicine)
Show Figures

Figure 1

Figure 1
<p>Placement of condom on metal slice with predefined thicknesses.</p>
Full article ">Figure 2
<p>The metal frame locks the spanned condom in place.</p>
Full article ">Figure 3
<p>Probe placement in a standardized position. The bucket holds distilled water and is insulated to prevent ultrasonic reverberations. The metal frame is positioned inside. <a href="#jcm-13-03625-f001" class="html-fig">Figure 1</a>, <a href="#jcm-13-03625-f002" class="html-fig">Figure 2</a> and <a href="#jcm-13-03625-f003" class="html-fig">Figure 3</a> were provided with kind permission from H. Dudwiesus.</p>
Full article ">Figure 4
<p>B-mode-image of the in vitro setup. The two horizontal lines are the membranes of a condom, with a predefined distance in between. The cone-like structures below are sound-absorbing foam.</p>
Full article ">Figure 5
<p>Mean ΔNT values, by mode of ‘Radiant’.</p>
Full article ">Figure 6
<p>Correlation between Native NT and ΔNT (for ‘Radiant max’).</p>
Full article ">Figure 7
<p>In vitro measurement of a 2.5 mm distance with and without ‘Radiant’. (<b>a</b>,<b>b</b>) Settings with ‘Harmonic Imaging’ and ‘Radiant off’, whole picture, and zoomed-in section below. (<b>c</b>,<b>d</b>) The same object with ‘Harmonic Imaging’ and ‘Radiant max’.</p>
Full article ">
Back to TopTop