Skip to main content

previous disabled Page of 20
and
  1. No Access

    Chapter and Conference Paper

    Research on Novel Topologies of Integrated Pulsed Alternator Systems

    The novel integrated pulsed alternator topology is a kind of pulsed power system that radially integrates prime motor and pulsed alternator, which solves the problems such as mechanical noise, excessive axial ...

    Songlin Wu, Shaopeng Wu, Shumei Cui in Conference Proceedings of the 2023 3rd Int… (2024)

  2. No Access

    Chapter and Conference Paper

    Comprehensive Design of Electrical Machines for Integrated Pulsed Discharge Systems

    Based on the radial integrated pulsed discharge systems of prime motor and pulsed alternator, the match criteria between the specification parameters of motor and alternator are studied, and the electromagneti...

    Songlin Wu, Shaopeng Wu, Shumei Cui in The Proceedings of the 18th Annual Confere… (2024)

  3. No Access

    Chapter and Conference Paper

    Unsupervised Multi-population Evolutionary Algorithm for Community Detection in Attributed Networks

    Community detection on attributed networks is a method to discover community structures within attributed networks. By applying community detection on attribute networks, we can better understand the relations...

    Junjie Wu, Lin Wu, Kun Guo in Computer Supported Cooperative Work and Social Computing (2024)

  4. No Access

    Chapter and Conference Paper

    Neighborhood Learning for Artificial Bee Colony Algorithm: A Mini-survey

    Artificial bee colony (ABC) algorithm is a representative paradigm of swarm intelligence optimization (SIO) algorithms, which has received much attention in the field of global optimization for its good perfor...

    **nyu Zhou, Guisen Tan, Yanlin Wu, Shuixiu Wu in Neural Information Processing (2024)

  5. No Access

    Chapter and Conference Paper

    Voltage Regulation Method for Active Distribution Networks Based on Rotary Voltage Regulator

    Due to the dominant resistive component in distribution lines, the voltage upper and lower limits may occur in the same scenario. The voltage upper limit is caused by daytime photovoltaic power injection, whil...

    **angwu Yan, Chen Shao, Weifeng Peng in The Proceedings of 2023 International Conf… (2024)

  6. Chapter and Conference Paper

    Aerodynamic Characterization of a Ballistic-Correction Bullet

    Obtaining the aerodynamic parameters of a ballistic-correction bullet is crucial for improving ballistic correction efficiency and enhancing shooting accuracy. In this study, a numerical simulation method is u...

    Hongyue Zhang, Zhilin Wu in The 8th International Conference on Advanc… (2024)

  7. No Access

    Chapter and Conference Paper

    Improving Speech Perceptual Quality and Intelligibility Through Sub-band Temporal Envelope Characteristics

    In the speech enhancement (SE) model, using auxiliary loss based on acoustic parameters can improve enhancement effects. However, currently used acoustic parameters focus on frequency domain information, negle...

    Ruilin Wu, Zhihua Huang, **gyi Song, **aoming Liang in Man-Machine Speech Communication (2024)

  8. No Access

    Chapter and Conference Paper

    Die Matching Performance of Ultra-Thin Titanium Sheet Driven by Polyurethane During Electromagnetic Forming

    Electromagnetic forming of ultra-thin titanium plates requires high conductivity drive plates, resulting in low die matching rates. Rubber is expected to improve the die matching performance because of large d...

    Runze Liu, **aotao Han, Pengxin Dong in The proceedings of the 18th Annual Confere… (2024)

  9. No Access

    Chapter and Conference Paper

    Technological Empowerment for Aging Workforce in Elderly Care Programs: Service Model Design and Development of an Elderly Care Shared Service Platform

    This study introduces a platform designed to address the challenges of global aging by implementing an “elderly assist for elderly” concept. It aims to alleviate the long-term care service manpower shortage by...

    Tsai-Hsuan Tsai, Hsin-Yu Lo, Shih-Lin Wu in Universal Access in Human-Computer Interac… (2024)

  10. No Access

    Chapter and Conference Paper

    A Local Interpretability Model-Based Approach for Black-Box Adversarial Attack

    Deep learning models are vulnerable to adversarial examples due to their fragility. Current black-box attack methods typically add perturbations to the whole example, and added perturbations may be large and e...

    Yuanjie Duan, **ngquan Zuo, Hai Huang, Binglin Wu, **nchao Zhao in Data Mining and Big Data (2024)

  11. No Access

    Chapter and Conference Paper

    A Flexible Tactile Sensor for Robots Based on Electrical Impedance Tomography

    During social interactions, people can obtain a great deal of important information from their tactile senses to improve their relationship with their surroundings. The development of similar capabilities in r...

    Zhiqiang Duan, Lekang Liu, Jun Zhu, Ruilin Wu in Cognitive Computation and Systems (2024)

  12. No Access

    Chapter and Conference Paper

    A Pre-synchronization Scheme for Grid Connection of Multiple Virtual Synchronous Generators Based on Current Limiting Link

    For distributed renewable energy devices that can operate in both grid connected and island mode, and can switch between the two according to demand, The key issue in the switching process is the pre-synchroni...

    Desheng Wang, Hui Liu, Linlin Wu, **ao Wang in The Proceedings of the 18th Annual Confere… (2024)

  13. No Access

    Chapter and Conference Paper

    Analysis on Grey Space Form and Simulation Evaluation in Landscape Design

    In order to improve the landscape design effect, this paper combines intelligent grey space algorithm to improve the design algorithm, and uses Mean-shift algorithm to smooth the multi-focus image. Moreover, t...

    Songlin Wu in Multidimensional Signals, Augmented Reality and Information Technologies (2024)

  14. No Access

    Chapter and Conference Paper

    String Constraints with Regex-Counting and String-Length Solved More Efficiently

    Regular expressions (regex for short) and string-length function are widely used in string-manipulating programs. Counting is a frequently used feature in regexes that counts the number of matchings of sub-pat...

    Denghang Hu in Dependable Software Engineering. Theories, Tools, and Applications (2024)

  15. No Access

    Chapter and Conference Paper

    Application of Multivariate Statistical Techniques and Water Quality Index to Assess Surface Water Quality: A Case Study of Zhaojiaxi River, China

    The water quality in Zhaojiaxi River basin (China) was investigated in terms of water quality index (WQI) and multivariate statistical techniques including factor analysis (FA) and cluster analysis (CA). The m...

    Kun Luo, Fangkai Ma, Lingkai Sun, Conglin Wu in Advances in Energy Resources and Environme… (2024)

  16. No Access

    Chapter and Conference Paper

    A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks

    Deep neural networks have been recently utilized in source code vulnerability detection methods due to their automated feature learning capabilities. However, current deep vulnerability detection models heavil...

    Ciling Zeng, Bo Zhou, Huoyuan Dong, Haolin Wu, Peiyuan **e in Frontiers in Cyber Security (2024)

  17. No Access

    Chapter and Conference Paper

    Computer Vision Based Method for Identifying Grouting Defects of Prefabricated Building Sleeves

    In order to accurately detect the grouting defects of construction sleeves, a method for identifying the grouting defects of prefabricated construction sleeves based on computer vision is proposed. The 3D targ...

    Shunbin Wang, Lin Wu in Multimedia Technology and Enhanced Learning (2024)

  18. No Access

    Chapter and Conference Paper

    Stability Detection of Building Bearing Structure Based on Bim and Computer Vision

    The stability of building load-bearing structure is closely related to the building life. Unstable building load-bearing structure has a great potential safety hazard. The stability detection method of buildin...

    Lin Wu, Shunbin Wang in Multimedia Technology and Enhanced Learning (2024)

  19. No Access

    Chapter and Conference Paper

    Adaptive Neural Composite Learning Finite-Time Control for a QUAV with Guaranteed Tracking Performance

    This paper discusses the neural adaptive composite learning finite-time control for a quadrotor unmanned aerial vehicle (QUAV). Based on the command filter backstep** control (CFBC) scheme, the computational...

    Chenglin Wu, Shuai Song in Cognitive Systems and Information Processing (2024)

  20. No Access

    Chapter and Conference Paper

    Control the Migration of Self-propelling Particles in Thermal Turbulence via Reinforcement Learning Algorithm

    Planning energy-efficient trajectories can significantly benefit unmanned aerial vehicles (UAVs) by increasing their endurance. Inspired by birds that exploit warm rising atmospheric currents, flying vehicles ...

    Ao Xu, Hua-Lin Wu, Heng-Dong ** in Proceedings of the IUTAM Symposium on Turb… (2024)

previous disabled Page of 20