This paper presents a novel approach known as Neutrosophic Fuzzy Power Management (NFPM) aimed at addressing the critical challenge of uncertain energy availability in Energy Harvesting Sensor Networks (EHWSNs). The m...
详细信息
Perovskite solar cells have shown great potential in the field of underwater solar cells due to their excellent optoelectronic properties;however,their underwater performance and stability still hinder their practical...
详细信息
Perovskite solar cells have shown great potential in the field of underwater solar cells due to their excellent optoelectronic properties;however,their underwater performance and stability still hinder their practical *** this research,a 1H,1H,2H,2H-heptadecafluorodecyl acrylate(HFDA)anti-reflection coating(ARC)was introduced as a high-transparent material for encapsulating perovskite solar modules(PSMs).Optical characterization results revealed that HFDA can effectively reduce reflection of light below 800 nm,aiding in the absorption of light within this wavelength range by underwater solar ***,a remarkable efficiency of 14.65%was achieved even at a water depth of 50 ***,the concentration of Pb^(2+)for HFDA-encapsulated film is significantly reduced from 186 to 16.5 ppb after being immersed in water for 347 ***,the encapsulated PSMs still remained above 80%of their initial efficiency after continuous underwater illumination for 400 ***,being exposed to air,the encapsulated PSMs maintained 94%of their original efficiency after 1000 h light *** highly transparent ARC shows great potentials in enhancing the stability of perovskite devices,applicable not only to underwater cells but also extendable to land-based photovoltaic devices.
Roads are an important part of transporting goods and products from one place to another. In developing countries, the main challenge is to maintain road conditions regularly. Roads can deteriorate from time to time. ...
详细信息
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In...
详细信息
In an Internet of Things (IoT) assisted Wireless Sensor Network (WSN), the location of the Base Station (BS) remains important. BS serves as the central hub for data collection, aggregation and communication within th...
详细信息
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can ha...
详细信息
Cloud computing provides a diverse and adaptable resource pool over the internet,allowing users to tap into various resources as *** has been seen as a robust solution to relevant challenges.A significant delay can hamper the performance of IoT-enabled cloud ***,efficient task scheduling can lower the cloud infrastructure’s energy consumption,thus maximizing the service provider’s revenue by decreasing user job processing *** proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm(MCWOA),combines elements of the Chimp Optimization Algorithm(COA)and the Whale Optimization Algorithm(WOA).To enhance MCWOA’s identification precision,the Sobol sequence is used in the population initialization phase,ensuring an even distribution of the population across the solution ***,the traditional MCWOA’s local search capabilities are augmented by incorporating the whale optimization algorithm’s bubble-net hunting and random search mechanisms into MCWOA’s position-updating *** study demonstrates the effectiveness of the proposed approach using a two-story rigid frame and a simply supported beam *** outcomes reveal that the new method outperforms the original MCWOA,especially in multi-damage detection *** excels in avoiding false positives and enhancing computational speed,making it an optimal choice for structural damage *** efficiency of the proposed MCWOA is assessed against metrics such as energy usage,computational expense,task duration,and *** simulated data indicates that the new MCWOA outpaces other methods across all *** study also references the Whale Optimization Algorithm(WOA),Chimp Algorithm(CA),Ant Lion Optimizer(ALO),Genetic Algorithm(GA)and Grey Wolf Optimizer(GWO).
Network function virtualisation (NFV) offers several benefits to both network operators and end users. It is a more programmable and low-cost solution as compared to a traditional network. Since the network functions ...
详细信息
Wireless sensor network (WSN) applications are added day by day owing to numerous global uses (by the military, for monitoring the atmosphere, in disaster relief, and so on). Here, trust management is a main challenge...
详细信息
Voice casting is one of the most crucial aspects of dubbing and localization, which consists of adapting audio-visual content from one language and culture to another. Dubbing is widely used in various industries, suc...
详细信息
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunnelin...
详细信息
Due to their biological interpretability,memristors are widely used to simulate synapses between artificial neural *** a type of neural network whose dynamic behavior can be explained,the coupling of resonant tunneling diode-based cellular neural networks(RTD-CNNs)with memristors has rarely been reported in the ***,this paper designs a coupled RTD-CNN model with memristors(RTD-MCNN),investigating and analyzing the dynamic behavior of the *** on this model,a simple encryption scheme for the protection of digital images in police forensic applications is *** results show that the RTD-MCNN can have two positive Lyapunov exponents,and its output is influenced by the initial values,exhibiting ***,a set of amplitudes in its output sequence is affected by the internal parameters of the memristor,leading to nonlinear ***,the rich dynamic behaviors described above make the RTD-MCNN highly suitable for the design of chaos-based encryption schemes in the field of privacy *** tests and security analyses validate the effectiveness of this scheme.
暂无评论