Trusted computingtechnology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. the incorporation of Trusted computing introduces a se...
详细信息
In traditional optical reservoir computing, the least squares method are commonly used to train the output weights for regression tasks. Although these algorithms are highly versatile, their training efficiency and ac...
详细信息
In the summer and autumn seasons, insect chirping (such as cicadas) emerges as the predominant environmental noise interference in outdoor audio data collection. Although existing speech enhancement models have made p...
详细信息
An uncountable number of computational resources are shared for various applications using a transformative technology called Cloud computing. It is an emerging technologythat can offer scalable and on-demand resourc...
详细信息
A low-complexity scheme based on Gurobi is proposed to address the problem of high complexity of waveform design solution algorithms in dual-functional radar-communication (DFRC) systems. Firstly, a DFRC system is con...
详细信息
this article examines the requirements for information security in monitoring e-government systems. It discusses the information security framework for eGoverment system, a model for organizing multi-level network sec...
详细信息
Artificial Intelligence (AI) is increasingly used in cognitive health assessments, withthe Clock Drawing Test (CDT) being an effective cognitive evaluation tool. However, the complexity of CDT image structures, high ...
详细信息
the established SDN multi-controller architecture faces the challenge of locating controllers to boost the scalability, reliability, and security of the network. Reliability is one of the important metric to handle wh...
详细信息
this paper proposes a new ant colony optimization for multi-Label Correlation-Based Feature Selection (ACO-ML-CFS). this ACO performs a global search within the space of candidate features to identify an optimal subse...
详细信息
the HVAC system, energy storage building, distributed power supply, and other equipment are integrated into the scheduling algorithm, which is aimed at reducing household electricity consumption. It is also assumed th...
详细信息
ISBN:
(纸本)9798331523923
the HVAC system, energy storage building, distributed power supply, and other equipment are integrated into the scheduling algorithm, which is aimed at reducing household electricity consumption. It is also assumed that users can provide energy to the grid according to their own conditions. Taking electricity cost and comfort level as optimization targets, a home energy optimization control model for the coordinated management of hybrid energy sources is built. A smart scheduling mechanism based on the improved adaptive particle swarm optimization approach is proposed in order to derive the best time intervals for electric appliances, necessary power for the control of the room temperature for every time frame, and power for charging and discharging of the storage battery at various moments. Simulation results show that through the incorporation of distributed photovoltaic power generation, backup storage by battery, and home energy optimization control, the system efficiently balances between user comfort and electricity consumption. this offers great technical support to the development of home energy management systems. By using time-of-use electricity price for energy acquisition and supply, the optimization control goal is minimizing both power use and cost as well as preserving comfort levels. the hybrid energy management's proposed home energy optimization control model uses an adaptive particle swarm optimization algorithm to find the optimal operation schedules of the electrical appliances, the required power for temperature control in a room, and the charge/discharge power level of the storage battery at each time interval. As per the optimization principle, the proposed dynamic programming algorithm converts the multi-stage problem into a sequence of single-stage problems and solves them separately. this method successfully resolves intricate problems that cannot be addressed through greedy algorithms or divide-and-conquer. In this research, management ac
暂无评论