Please wait a minute...
, No 3
 ■ Cover Page (PDF 3,200 KB) ■ Editorial Board (PDF 82 KB)  ■ Table of Contents, March 2018 (40 KB)
  • Original articles
    Comparison of Conventional Method of Fault Determination with Data-Driven Approach for Ball Bearings in a Wind Turbine Gearbox
    V. N. Balavignesh, B. Gundepudi, G. R. Sabareesh, and I. Vamsi
    2018, 14(3): 397-412.  doi:10.23940/ijpe.18.03.p1.397412
    Abstract    PDF (1523KB)   
    References | Related Articles

    The presented investigation on fault diagnosis of ball bearings compares the conventional method using FFT spectra with a data-driven approach using Support Vector Machines (SVMs). Three different cases of bearings (one healthy and two faulty bearings with different crack thickness) were used as experimental cases. The experimentally obtained time-domain acceleration signals were converted to the frequency-domain and de-noised using optimal wavelets selected based on relative magnitudes of Shannon entropy and energy values. The dominant peak was identified for each case and was subsequently compared with the characteristic bearing frequencies evaluated theoretically. The wavelet transformed time-domain experimental data was also used to train the SVM classifier. Also, the effect of statistical tools such as Principal Component Analysis (PCA) and Zero-phase Component Analysis (ZCA) on the classification accuracy of normal SVM and wavelet feature extraction-based SVM have been investigated.

    Submitted on June 24, 2017; Revised on December 26, 2017; Accepted on December 29, 2017
    References: 29
    Bearing Fault Diagnosis based on Stochastic Resonance with Cuckoo Search
    Kuo Chi, Jianshe Kang, Xinghui Zhang, and Zhiyuan Yang
    2018, 14(3): 413-424.  doi:10.23940/ijpe.18.03.p2.413424
    Abstract    PDF (1308KB)   
    References | Related Articles

    Rolling bearings are the main components of modern machinery, and harsh operating environments often make them prone to failure. Therefore, detecting the incipient fault as soon as possible is useful for bearing prognostics and health management. However, the useful feature information relevant to the bearing fault contained in the vibration signals is weak under the influence of the noise and transmission path. The useful feature information is even submerged in the noise. Thus, it becomes difficult to identify the fault symptom of rolling bearings in time from the vibration signals. Stochastic resonance (SR) is a reliable method to detect the weak signal in intense noise. However, the effect of SR depends on the adjustment of two parameters. Cuckoo Search (CS) is a heuristic novel optimization algorithm that can search the global solution quickly and efficiently. Thus, CS is utilized to optimize the two parameters in this paper. Local signal-to-noise ratio (LSNR) is used to evaluate resonance effect. Two bearing fault datasets were used to confirm the effectiveness of SR optimized by CS. SR methods optimized by particle swarm optimization (PSO), genetic algorithms (GA), firefly algorithm (FA), and ant colony optimization (ACO) are also used to detect the bearing fault signal in the two datasets. The analysis results state SR optimized by CS can find better LSNR than SR optimized by other algorithms no matter if it is in the same iterations or in the same computation time, thereby making the fault feature more obvious.

    Submitted on October 12, 2017; Revised on December 8, 2017; Accepted on December 29, 2017
    References: 39
    Analyzing Short Circuit Forces in Transformer for Double Layer Helical LV Winding using FEM
    Deepika Bhalla, Raj Kumar Bansal, and Hari Om Gupta
    2018, 14(3): 425-433.  doi:10.23940/ijpe.18.03.p3.425433
    Abstract    PDF (1069KB)   
    References | Related Articles

    In medium and high capacity transformers where current rating is high and the number of turns is low, the low voltage (LV) winding is generally of the helical type. These helical windings have very large magnitudes of electromagnetic forces during a short circuit. This is due to the inherent asymmetry of helical structure. The objective of this work is to use the finite element method to compute the radial and axial components of short circuit forces and identify areas of high stresses in the windings. This can be used to find the likely reason of transformer failure during a short circuit. For this work, a 3-phase power distribution transformer of 11kV/433V, 630kVA rating is considered. The effect on short circuit forces of the tapping in the center of HV winding is also studied.

    Submitted on May 9, 2017; First revised on July 30, 2017; Second revised on January 11, 2018; Accepted on January 14, 2018
    References: 14
    CNN-based Flow Field Feature Visualization Method
    Tang Bin Li Yi
    2018, 14(3): 434-444.  doi:10.23940/ijpe.18.03.p4.434444
    Abstract    PDF (1236KB)   
    References | Related Articles

    The feature-based visualization method can separate important areas for users from flow field data, which can better highlight the feature structure. However, most of the current feature extraction methods are only applicable to single typical features, and they need complex mathematical analysis. Based on the above reasons, this paper proposes a universal feature visualization method, recognizes demand in the region of flow data, shows the characteristics of structure protruding from the global visual effect in the design of a multi-dimension parallel convolution kernel that contains the recognition model, and further puts forward the method of feature visualization based on a convolutional neural network. Compared with the classical three level BP neural network model, our model gets a high accuracy rate. We verify the effectiveness of the method and solve the problem of insufficient expansion of existing methods.

    Submitted on December 6, 2017; Revised on January 24, 2018; Accepted on February 15, 2018
    References: 15
    Colorized Image Forgery Detection based on Similarity Measurement of Gaussian Mixture Distribution
    Ze Yang, Jianhou Gan, Juxiang Zhou, Bin Wen, and Jun Wang
    2018, 14(3): 445-452.  doi:10.23940/ijpe.18.03.p5.445452
    Abstract    PDF (949KB)   
    References | Related Articles

    In the era of rapid development of multi-media information, forgery detection has become an important research field of digital image security. This paper proposes a new method to detect the forged image generated by deep learning. First, the feature matrix is constructed through extracting each pixel value of channels a and b in Lab color space for the real and the forged image training set, respectively, which is used to fit the Gaussian Mixture Model (GMM) distribution. Then, the Expectation Maximization (EM) adaptation algorithm is used to re-fit the GMM for test image using the obtained GMM parameter as prior information. Finally, the similarity between two GMM is calculated for forgery detection. Experiments show that the proposed method is more accurate than the traditional SVM for forgery detection.

    Submitted on December 8, 2017; Revised on January 16, 2018; Accepted on February 17, 2018
    References: 13
    Trust Authorization Monitoring Model in IoT
    Ruizhong Du, Chong Liu, and Fanming Liu
    2018, 14(3): 453-462.  doi:10.23940/ijpe.18.03.p6.453462
    Abstract    PDF (281KB)   
    References | Related Articles

    With strong heterogeneity and the limited computing ability of IoT nodes, this dissertation proposes a Trust Authorization Model based on detection feedback in IoT that is combined with the current trust model of IoT as well as implement storage and other tasks. By calculating and storing the cluster head node along with its strong ability to facilitate the data transmission and search for energy consumption, it prevents the local network from being limited by the computing power of the device. In terms of trust calculation, the threshold value is based on the recommendation. At the same time, the BP neural network algorithm with self-learning function is periodically detecting the interactive data stream, detecting the attack nodes, quickly implementing the response measures, and meeting the actual situation of unmanned IoT of mass devices. Simulation results show that this model has lower energy consumption than other similar models, has good coping ability for attacks such as malicious recommendation and malicious slander, and has a higher detection rate and response rate to attack nodes.

    Submitted on December 23, 2017; Revised on January 27, 2018; Accepted on February 24, 2018
    References: 15
    Superresolution Approach of Remote Sensing Images based on Deep Convolutional Neural Network
    Jitao Zhang, Aili Wang, Na An, and Yuji Iwahori
    2018, 14(3): 463-472.  doi:10.23940/ijpe.18.03.p7.463472
    Abstract    PDF (1093KB)   
    References | Related Articles

    Nowadays, remote sensing images have been widely used in civil and military fields. But, because of the limitations of the current imaging sensors and complex atmospheric conditions, the resolution of remote sensing images is often low. In this paper, a superresolution reconstruction algorithm based on the deep convolution neural network to improve the resolution of the remote sensing image is proposed. First, this algorithm learned a series of features of the mapping between high and low resolution images in the training phase. This mapping is expressed as a kind of deep convolutional neural network; the trained network is a series of parameter optimization for super-resolution reconstruction of remote sensing image. Experimental results show that the superresolution algorithm proposed in this paper can keep the details subjectively and improve the evaluation index objectively.

    Submitted on December 6, 2017; Revised on January 16, 2018; Accepted on February 12, 2018
    References: 18
    State-Control-Limit-Based Rejuvenation Modeling of Virtualized Cloud Server
    Weichao Dang Jianchao Zeng
    2018, 14(3): 473-782.  doi:10.23940/ijpe.18.03.p8.473482
    Abstract    PDF (1719KB)   
    References | Related Articles

    Software rejuvenation modeling of the virtualized Cloud Server has been studied. A software rejuvenation policy on the virtual machines and the virtual machine monitor has been proposed in order to ensure high availability of the virtualized Cloud Server. The multi-component system, composed of the virtual machines and the virtual machine monitor, which are structurally dependent, has been reduced to the multiple two-component systems. The state-control-limit-based rejuvenation policy has been proposed and the stationary probability density of the two component system state has been derived. Furthermore, the stationary unavailability of the virtualized Cloud Server has been modeled. Numerical experiments have verified the correctness of the probability density function and the feasibility of the rejuvenation policy. The state-control-limit-based rejuvenation policy leads to lower unavailability of the virtualized Cloud Server in comparison with the lifetime-based rejuvenation policy.

    Submitted on November 15, 2017; Revised on January 21, 2018; Accepted on February 19, 2018
    References: 21
    Design of Intelligent Public Transportation System based on ZigBee Technology
    Jing Bian, Xiuxia Yu, and Wei Du
    2018, 14(3): 483-492.  doi:10.23940/ijpe.18.03.p9.483492
    Abstract    PDF (390KB)   
    References | Related Articles

    In this article, an intelligent public transportation system based on ZigBee 3.0 technology is proposed after researching conditions of recent public transportation systems that mostly adopt GPS or Beidou satellite positioning technology, 3G/4G communication technology and GIS technology. This system includes the principle and design of system architecture, design of intelligent public transportation system network, the solution of moving-bus positioning, the auto-announce function and design of intelligent public transportation stop board. Contrasted with recent bus systems, this system has the virtue of low construction cost, low running cost, low implementation difficulty and high intelligent level. ZigBee 3.0 protocol is compatible with Wi-Fi, too. Without additional ZigBee chip in smart phones, the intelligent public transportation system based on ZigBee 3.0 can interconnect with smart phones directly. It will break the barrier between citizens and intelligent public transportation systems, and the real intelligence can be realized.

    Submitted on December 13, 2017; Revised on January 16, 2018; Accepted on February 9, 2018
    References: 8
    3D Scene Recovery based on Multiple Objects Tracking in Sport Videos
    Shihe Tian, Ming Huang, Yang Liu, and Chengxin Li
    2018, 14(3): 493-501.  doi:10.23940/ijpe.18.03.p10.493501
    Abstract    PDF (391KB)   
    References | Related Articles

    This paper proposes a new method for estimating the player’s and ball’s 3D position information from monocular broadcast videos. For players, the homography between image and playfield is used to estimate their positions. By analyzing the geometry relation between the ball, its “virtual” shadow and camera position, we derive equations for estimating the flying ball’s 3D position. Moreover, we propose a method to predict the flying plane if it cannot be determined from images. This method designs a new cost function, which arrives at the minimum when the predicted flying plane is reasonable. This method has at least two merits. One is that it can estimate the flying ball’s position without referring to other objects with known height; the other is that only one assumption is made and the camera is in a fixed position. Experimental results are satisfying.

    Submitted on December 29, 2017; Revised on January 30, 2018; Accepted on February 19, 2018
    References: 15
    An Improved Parallel Collaborative Filtering Algorithm based on Hadoop
    Baojun Fu
    2018, 14(3): 502-511.  doi:10.23940/ijpe.18.03.p11.502511
    Abstract    PDF (581KB)   
    References | Related Articles

    The existed parallel collaborative filtering algorithm based on co-occurrence matrix (CMCF) consumes a lot of time in the construction of co-occurrence matrixes and calculation of matrix multiplication. It also ignores the role of neighboring users, so it will influence the accuracy of recommendation. In order to solve this problem, this paper proposes the improved parallel collaborative filtering algorithm (IPCF) and its implementation on spark. The experimental results show that the improved parallel collaborative filtering algorithm in this paper has better running efficiency and higher recommendation accuracy.

    Submitted on December 19, 2017; Revised on January 22, 2018; Accepted on February 17, 2018
    References: 14
    DDoS Attacks Defense Mechanism based on Secure Routing Alliance
    Xiaohui Yang Yue Yu
    2018, 14(3): 512-520.  doi:10.23940/ijpe.18.03.p12.512520
    Abstract    PDF (441KB)   
    References | Related Articles

    Distributed Denial of Service (DDoS) attacks on the cloud computing platform has become one of the key issues affecting cloud security. According to the sources of security threat of cloud computing platform, construct secure routing alliance, filter and resist DDoS from the route of cloud user to cloud computing center, design data forwarding mechanism and fault nodes replacement mechanism. The strategy of secure overlay services is combined with the structural characteristics of the ubiquitous routing platform to defend against DDoS attacks. The Chord ring is improved, the nodes are divided according to the distance in the physical network, and the Chord algorithm is avoided repeatedly ignoring the forwarding of physical paths. Since the original Chord algorithm is applied to the P2P network, in order to make it more suitable for the hierarchical physical topology, only the first three jumps of the Chord algorithm's query steps are taken. Fault nodes replacement mechanism uses virtual machine technology to convert nodes in the network into a large number of virtual nodes and serve as backup nodes in the security structure in time to replace the attacked nodes with backup nodes to minimize the impact of attacks on the nodes. The simulation results show that with the increase of the number of nodes, the data passing rate of the secure routing alliance can exceed 90% and the pass rate can be guaranteed to be over 35% when the number of attack nodes is large, which ensures data security and the availability of the transmission paths.

    Submitted on December 25, 2017; Revised on January 16, 2018; Accepted on February 20, 2018
    References: 21
    Compressed Sensing Reconstruction of Remote Sensing Image Block based on Augmented Lagrangian Method TV
    Sheng Cang Achuan Wang
    2018, 14(3): 521-530.  doi:10.23940/ijpe.18.03.p13.521530
    Abstract    PDF (722KB)   
    References | Related Articles

    With the development of remote sensing technology and the diversification of sensors, remote sensing image data reveals the trend of “three features” -- high resolution, hyper spectral and multi-temporal. As the increasing demand of remote sensing information, considerable amounts of data will be acquired, transmitted and stored in various remote sensing applications, which, without doubt, sets higher requirements for data processing. To solve the above problems, according to the feature of compressed sensing theory, which original image can be reconstructed by low sampling data, we develop a new method of Remote Sensing Image Block Compressed Sensing Reconstruction Based on Augmented Lagrangian Method TV. It represented remote sensing image sparsely by means of block sampling and joint sparse representation model. Besides, it also combined the total Variation and Augmented Lagrangian method to optimize the solution and implemented the algorithm of the model. Finally, it created a remote sensing image with low distortion. Furthermore, it also increased efficiency in data transmission and reduced data storage. Simulation test results confirm the validity of algorithm proposed in this paper and also suggest that it can achieve better effects of a distinct advantage in PSNR, which is remote sensing image reconstruction, in comparison with other algorithms.

    Submitted on November 8, 2017; Revised on January 2, 2018; Accepted on February 3, 2018
    References: 17
    Numerical Analysis of Ventilation for Ship E/R with CFD Method
    Jianping Chen, Jie Xu, Litao Wang, Xinen Chen, and You Gong
    2018, 14(3): 531-546.  doi:10.23940/ijpe.18.03.p14.531546
    Abstract    PDF (1409KB)   
    References | Related Articles

    The paper presents a CFD numerical simulation method for ship engine room ventilation. First, through the discretization of the fluid governing equations, apply the basic physical model of ship engine room established by GABIT Software to lay out the engine room outlet according to the air supply and then divide the meshes. After the physical model is established, import the FLUENT and then reasonably choose the boundary conditions, solving methods and solving precision. Finally, obtain the optimal scheme by the example of researching the airflow velocity, temperature and humidity distribution under different ventilation schemes, and compare the characteristics of various schemes. The method presented in the paper has a strong significance of theoretical analysis and practical guidance for optimizing the ventilation of the ship engine room.

    Submitted on December 12, 2017; Revised on January 13, 2018; Accepted on February 16, 2018
    References: 11
    Andro_MD: Android Malware Detection based on Convolutional Neural Networks
    Nannan Xie, Xiaoqiang Di, Xing Wang, and Jianping Zhao
    2018, 14(3): 547-558.  doi:10.23940/ijpe.18.03.p15.547558
    Abstract    PDF (405KB)   
    References | Related Articles
    Android OS maintains its dominance in smart terminal markets, which brings growing threats of malicious applications (apps). The research on Android malware detection has attracted attention from both academia and industry. How to improve the malware detection performance, what classifiers should be selected, and what features should be employed are all critical issues that need to be solved. Convolutional Neural Networks (CNN) is a typical deep learning technique that has achieved great performance in image and speech recognitions. In this work, we present an Android malware detection framework Andro_MD that can train and classify samples with a deep learning technique. The framework includes dataset construction and feature preprocessing, training and classification by CNN, and evaluation by experiments. First, an Android app dataset is constructed with 21,000 samples collected from third-party markets and 34,570 features of 7 categories. Second, we employ sequential and parallel models to train the extracted features and classify the malware apps. Finally, extensive experimental results show the effectiveness and feasibility of the proposed method. Comparisons with similar work and traditional classifiers show that Andro_MD has a better performance on malware detection, and its accuracy can achieve 99.25% with a FPR of 0.53%. The "request permissions" and "used permissions" feature categories have better performances with limited dimensions.
    Submitted on December 20, 2017; Revised on January 21, 2018; Accepted on February 24, 2018
    References: 44
    Brushless DC Motor Control Strategy for Electric Vehicles
    Wanmin Li, Xinyong Li, Yan Wang, Xianhao Zeng, and Yunzi Yang
    2018, 14(3): 559-566.  doi:10.23940/ijpe.18.03.p16.559566
    Abstract    PDF (686KB)   
    References | Related Articles

    A self-adaptive fuzzy proportional integral derivative (PID) control method based on genetic optimization is proposed to solve the problem of low precision and low anti-jamming capabilities of the brushless direct current (DC) motor control system of electric vehicles. A double closed-loop speed control system model of the drive motor is established based on an analysis of the mathematic model of a permanent magnet brushless DC motor. Adaptive fuzzy PID control is introduced. The fuzzy membership function is optimized by the genetic algorithm and referred to as the optimized adaptive fuzzy PID control method. The design and simulation of the system are realized by using MATLAB/Simulink. Results show that in the same environment, the genetic algorithm with adaptive fuzzy PID control has better dynamic and static performance than ordinary and fuzzy PID. It has a good speed and anti-interference ability in a typical city driving environment.

    Submitted on December 16, 2017; Revised on January 17, 2018; Accepted on February 20, 2018
    References: 10
    A State-Space Degradation Model with Multiple Observations and Different Sampling Times
    Xianglong Ni, Xin Zhang, Jianmin Zhao, and Haiping Li
    2018, 14(3): 567-572.  doi:10.23940/ijpe.18.03.p17.567572
    Abstract    PDF (265KB)   
    References | Related Articles

    A traditional state-space model (SSM) only contains one observation equation. There are some restricted conditions when using the traditional SSM to describe the evolution process between a state indicator and multiple observation indicators instantaneously. In order to solve this problem, this paper puts forward an SSM that has multiple observation equations, which can be applied to multiple observation indicators with different sampling times. The modeling process and parameters evaluation approach of the proposed SSM are studied and given. A simulation study is conducted to indicate advantages of the proposed SSM when sampling times and observation equations are not the same for different observation indicators. Simulation results show that the proposed SSM is more accurate than the traditional SSM in system degradation prediction.

    Submitted on May 2, 2016; First revised on June 27, 2017; Second revised on December 3, 2017; Accepted on December 25, 2017
    References: 9
    A Calculation Method for Dependency Degree of Condition Attribute Set using Discernibility Matrix
    Hongchan Li, Junxing Liu, and Haodong Zhu
    2018, 14(3): 573-578.  doi:10.23940/ijpe.18.03.p18.573578
    Abstract    PDF (231KB)   
    References | Related Articles

    In the process of attribute reduction, the importance degree of a condition attribute is generally measured by means of the dependence degree between the condition attribute and the decision attribute set. If the dependence degree of the condition attribute is 0, we generally think that the condition attribute does not affect the decision results of the decision table and can be directly deleted form the condition attribute set. However, to some extent, it cuts off the connection of the condition attribute and other attributes, resulting in a great loss of valuable information in the decision table. Therefore, based on the fact that the dependency degree of the condition attribute set is more credible than the dependency degree of a single condition attribute, this paper researches the dependency degree of the condition attribute set and puts forward a calculation method for dependency degree of condition attribute set using a discernibility matrix. This paper also presents and proves a theorem to improve the proposed method. The proposed method can quickly get the discernibility matrix and can directly calculate the dependency degree of the condition attribute set. The theoretical analysis and the simulation experiment comparison results all show that the proposed method has better effectiveness and lower time complexity.
    Submitted on July 17, 2017; First revised on October 27, 2017; Second revised on November 21, 2017; Accepted on December 21, 2017
    References: 20

    Evaluating Protection for External Factors in Multi-State Systems
    Hongyan Dui
    2018, 14(3): 579-584.  doi:10.23940/ijpe.18.03.p19.579584
    Abstract    PDF (298KB)   
    References | Related Articles

    An external factor is an added condition beyond the normal load of the system affecting the system’s success. Each external factor has an influence on system components, which may lead to system failure. To decrease the effects of different states of the external factors on system components, multistate protections are established to protect the components from the effects of the external factors. The protection states are dependent on the external factor state. When a protection is at different states, the protection may be damaged. In this paper, considering the joint effect of the external factors and protections on system components, a measure of states of the protections on the system reliability is introduced to identify which protection level has the most important influence on the system success. Based on the importance values of different protections, appropriate actions can be applied in system components to improve the system protection and reliability and reduce the effects of external factors. At last, an example of a computer server system is used to demonstrate the proposed method.

    Submitted on November 19, 2017; First revised on November 23, 2017; Second revised on December 8, 2017; Accepted on December 14, 2017
    References: 10
    Performance Analysis of ADS-B Overlapping Signal Separation Algorithm based on RLS
    Zhaoyue Zhang
    2018, 14(3): 585-591.  doi:10.23940/ijpe.18.03.p20.585591
    Abstract    PDF (266KB)   
    References | Related Articles

    In order to solve the problem of incorrectly decode the ADS-B signal and the missing aircraft information caused by overlap and interference, in the information transmission process of 1090ES ADS-B signal, a multi overlapping 1090ES ADS-B signal separation algorithm based on RLS algorithm is proposed. After a comprehensive analysis of the ADS-B signal to a plurality of base stations, the algorithm applies RLS blind source separation and recovers the source signals of ADS-B, thereby improving signal decoding accuracy and the dynamic performance monitoring for aircraft. The paper has verified the signal separation, including signals based on two level overlapped and three level overlapped and signals with noise, and verified the feasibility of RLS algorithm in ADS-B signal separation by MATLAB simulation test.

    Submitted on December 9, 2017; Revised on January 16, 2018; Accepted on February 17, 2018
    References: 9
ISSN 0973-1318