Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access


    An Improved Solov2 Based on Attention Mechanism and Weighted Loss Function for Electrical Equipment Instance Segmentation

    Junpeng Wu1,2,*, Zhenpeng Liu2, Xingfan Jiang2, Xinguang Tao2, Ye Zhang3

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 677-694, 2024, DOI:10.32604/cmc.2023.045759

    Abstract The current existing problem of deep learning framework for the detection and segmentation of electrical equipment is dominantly related to low precision. Because of the reliable, safe and easy-to-operate technology provided by deep learning-based video surveillance for unmanned inspection of electrical equipment, this paper uses the bottleneck attention module (BAM) attention mechanism to improve the Solov2 model and proposes a new electrical equipment segmentation mode. Firstly, the BAM attention mechanism is integrated into the feature extraction network to adaptively learn the correlation between feature channels, thereby improving the expression ability of the feature map; secondly,… More >

  • Open Access


    An Improved Biometric Fuzzy Signature with Timestamp of Blockchain Technology for Electrical Equipment Maintenance

    Rao Fu1,*, Liming Wang2, Xuesong Huo2, Pei Pei2, Haitao Jiang3, Zhongxing Fu4

    Energy Engineering, Vol.119, No.6, pp. 2621-2636, 2022, DOI:10.32604/ee.2022.020873

    Abstract The power infrastructure of the power system is massive in size and dispersed throughout the system. Therefore, how to protect the information security in the operation and maintenance of power equipment is a difficult problem. This paper proposes an improved time-stamped blockchain technology biometric fuzzy feature for electrical equipment maintenance. Compared with previous blockchain transactions, the time-stamped fuzzy biometric signature proposed in this paper overcomes the difficulty that the key is easy to be stolen by hackers and can protect the security of information during operation and maintenance. Finally, the effectiveness of the proposed method More >

Displaying 1-10 on page 1 of 2. Per Page