This paper proposes a novel strategy to address the difficulties encountered in Botswana's open-pit mine dewatering procedures. The conventional approach, which relies on labor-intensive manual labor and mechanica...
详细信息
ISBN:
(数字)9798331529635
ISBN:
(纸本)9798331529642
This paper proposes a novel strategy to address the difficulties encountered in Botswana's open-pit mine dewatering procedures. The conventional approach, which relies on labor-intensive manual labor and mechanical switching, is expensive, time-consuming, and present significant safety hazards. To overcome these limitations, this project proposes a multi-sensor network system that automates and optimizes the dewatering process and improve operational efficiency. The system integrates real-time sensor data to monitor fuel consumption and water levels in mining pits, enabling precise pump operation control. The system has two sets of sensors for data collection on fuel levels in the reserve and dewatering pump tank. Water level sensors are also used to monitor the water levels in the tank and turn the pump on or off based on predetermined thresholds. After receiving the sensor data, a microcontroller controls the entire process and shows the fuel levels and consumption on an LCD screen. The system's circuitry was designed and simulated using Proteus software, and the LCD successfully displayed measurements obtained from the sensors. When the sump level surpassed the predetermined threshold, a relay was energized to initiate the motor, thereby pumping out the water. Similarly, the tank level sensor (LV800) detected water levels exceeding 80% capacity, sending a signal to the microcontroller, which, in turn, energized the relay to activate the stage motor. The LCD also displayed readings from the temperature and current sensors. Simulation results indicate that the proposed sensor-based approach effectively monitors the condition of the pumps. At the same time, the microcontroller, in conjunction with the sensors, can adequately control the pump's operation during the dewatering process in the mining pit. This research demonstrates the feasibility and effectiveness of employing sensors and a microcontroller in managing and controlling dewatering pumps. By automating the
Several applications of machine learning and artificial intelligence,have acquired importance and come to the fore as a result of recent advances and improvements in these *** cars are one such *** is expected to have...
详细信息
Several applications of machine learning and artificial intelligence,have acquired importance and come to the fore as a result of recent advances and improvements in these *** cars are one such *** is expected to have a significant and revolutionary influence on *** with smart cities,new infrastructure and urban planning with sophisticated cyber-security are some of the current ramifications of self-driving *** autonomous automobile,often known as selfdriving systems or driverless vehicles,is a vehicle that can perceive its surroundings and navigate predetermined routes without human *** are on the verge of evolving into autonomous robots,thanks to significant breakthroughs in artificial intelligence and related technologies,and this will have a wide range of socio-economic ***,in order for these automobiles to become a reality,they must be endowed with the perception and cognition necessary to deal with high-pressure real-life events and make proper judgments and take appropriate *** majority of self-driving car technologies are based on computersystems that automate vehicle control *** forward-collision warning and antilock brakes to lane-keeping and adaptive drive control,to fully automated driving,these technological components have a wide range of capabilities.A self-driving car combines a wide range of sensors,actuators,and *** researches on computer vision and deep learning are used to control autonomous driving *** self-driving automobiles,lane-keeping is *** study presents a deep learning approach to obtain the proper steering angle to maintain the robot in the *** propose an advanced control for a selfdriving robot by using two controllers *** neural networks(CNNs)are employed,to predict the car’and a proportionalintegral-derivative(PID)controller is designed for speed and steering *** stu
In this paper a motion profile design for unmanned aerial vehicles is proposed which method is able to guarantee safe collision-free motion. The motivations of the work are provided by the uncertainties of covered are...
详细信息
In this paper a motion profile design for unmanned aerial vehicles is proposed which method is able to guarantee safe collision-free motion. The motivations of the work are provided by the uncertainties of covered areas by the vehicles, and also the need of high performance fast vehicle motion. The uncertain information on the environment for detecting Conflict areas is processed through clustering and Mahalanobis-distance-based filtering methods. The resulted Conflict areas are involved in the motion design method, which is facilitated through reinforcement learning. This paper shows the application of the method on a drone that moves together with a mobile robot in the same environment. The safe and high performance motion of the drone is illustrated through simulation example.
Truck platooning is a promising technology that can reduce costs (fuel consumption) and enhance the overall transportation productivity. While recent research has focused on platoons' network and stability, few st...
Truck platooning is a promising technology that can reduce costs (fuel consumption) and enhance the overall transportation productivity. While recent research has focused on platoons' network and stability, few studies have tackled platooning formation and control. This paper uses Reinforcement Learning (RL) to study the dispatching control of trucks with arriving platoons, a problem first proposed in [1]. This work builds on [1] by considering the lack of the cost function and statistical knowledge. In particular, we employ Q-learning to compute the optimal dispatch control policy at a highway hub. Given the unbounded state space of the model, traditional Q-learning may converge slowly or even get stuck in sub-optimal policies. We improve Q-learning by confining the agent to transition in a finite subset of the state space. For this purpose, we use the switching condition property of the optimal policy (derived in [1]), the underlying random walk model, and a sensitivity analysis of the cost function. Our numerical results demonstrate that our Enhanced Q-learning converges significantly faster (up to 97%) in terms of CPU time and number of interactions.
Context: Bug-fix pattern detection has been investigated in the past in the context of classical software. However, while quantum software is developing rapidly, the literature still lacks automated methods and tools ...
详细信息
Optimization is a key technique for maximizing or minimizing functions and achieving optimal cost,gains,energy,mass,and so *** order to solve optimization problems,metaheuristic algorithms are *** of these techniques ...
详细信息
Optimization is a key technique for maximizing or minimizing functions and achieving optimal cost,gains,energy,mass,and so *** order to solve optimization problems,metaheuristic algorithms are *** of these techniques are influenced by collective knowledge and natural *** is no such thing as the best or worst algorithm;instead,there are more effective algorithms for certain ***,in this paper,a new improved variant of a recently proposed metaphorless Runge-Kutta Optimization(RKO)algorithm,called Improved Runge-Kutta Optimization(IRKO)algorithm,is suggested for solving optimization *** IRKO is formulated using the basic RKO and local escaping operator to enhance the diversification and intensification capability of the basic RKO *** performance of the proposed IRKO algorithm is validated on 23 standard benchmark functions and three engineering constrained optimization *** outcomes of IRKO are compared with seven state-of-the-art algorithms,including the basic RKO *** to other algorithms,the recommended IRKO algorithm is superior in discovering the optimal results for all selected optimization *** runtime of IRKO is less than 0.5 s for most of the 23 benchmark problems and stands first for most of the selected problems,including real-world optimization problems.
This work presents an approach to improve emotion recognition systems by using two approaches: selection of feature subset using swarm intelligence based bio-inspired algorithms, and fusion of features from different ...
This work presents an approach to improve emotion recognition systems by using two approaches: selection of feature subset using swarm intelligence based bio-inspired algorithms, and fusion of features from different regions of the face. For feature subset selection, Particle Swarm Optimisation (PSO) and Cuckoo Search algorithms are used. Classification is based on the fusion of features from three regions - entire face, mouth and eyes - and the predicted emotion (class label) is decided as the one given by two or more regions (Majority Vote). The ensemble of classifiers includes Random Forest and k-NN classifiers. It can be inferred that the ensemble model on an average yields 92% accuracy for Random Forest and 90% for k-NN, with a selected subset of almost half, or even less than half of the total features extracted. Moreover, not just in the majority region alone, the ensemble model outperformed the models in the mouth region and the face region. Though this work does not intend to show significant improvement in classification accuracy, the hybrid approaches and feature subsets presented in this work can significantly reduce computations with large datasets along with promising classification performance; moreover, some general observations and outcomes would help follow-ups in this area of research.
This paper presents several repair schemes for lowrate Reed Solomon (RS) codes over prime fields that can repair any node by downloading a constant number of bits from each surviving node. The resulting total bandwidt...
This paper presents several repair schemes for lowrate Reed Solomon (RS) codes over prime fields that can repair any node by downloading a constant number of bits from each surviving node. The resulting total bandwidth is higher than the bandwidth incurred during the trivial repair; however, this is still interesting in the context of leakage-resilient secret sharing. In that language, our results give attacks that show that k-out-of-n Shamir’s Secret Sharing over prime fields for small k is not leakage resilient, even if the parties only leak a constant number of bits. To the best of our knowledge, these are the first such *** another application, we provide decoding schemes for RS codes over prime fields, where the entire RS codeword is recovered by transmitting a constant number of bits from each *** results follow from a novel connection between exponential sums and repair of RS codes. In particular, we show that nontrivial bounds on certain exponential sums imply the existence of efficient nonlinear repair schemes for RS codes over prime fields.
Visual computing is vital for numerous applications. In conventional visual computing systems, CMOS image sensors (CIS) act as pure imaging devices for capturing images, however, recent CIS designs increasingly integr...
Visual computing is vital for numerous applications. In conventional visual computing systems, CMOS image sensors (CIS) act as pure imaging devices for capturing images, however, recent CIS designs increasingly integrate processing capabilities such as Deep Neural Networks (DNN), which give rise to a notion of in-sensor computing. In this paper, we propose a new concept, learned in-sensor visual computing, which exploits end-to-end optimization of in-sensor processing and downstream vision tasks to achieve better overall algorithm accuracy and adopts hardware/algorithm co-design to achieve ultra-low sensor energy consumption. Two examples of the learned in-sensor visual computing, Leca and EDGAzE, are demonstrated.
A stochastic-gradient-based interior-point algorithm for minimizing a continuously differentiable objective function (that may be nonconvex) subject to bound constraints is presented, analyzed, and demonstrated throug...
详细信息
暂无评论