Rainfall plays a significant role in managing the water level in the *** unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the *** individuals,especially those in the agric...
详细信息
Rainfall plays a significant role in managing the water level in the *** unpredictable amount of rainfall due to the climate change can cause either overflow or dry in the *** individuals,especially those in the agricultural sector,rely on rain *** rainfall is challenging because of the changing nature of the *** area of Jimma in southwest Oromia,Ethiopia is the subject of this research,which aims to develop a rainfall forecasting *** estimate Jimma's daily rainfall,we propose a novel approach based on optimizing the parameters of long short-term memory(LSTM)using Al-Biruni earth radius(BER)optimization algorithm for boosting the fore-casting accuracy.N ash-Sutcliffe model eficiency(NSE),mean square error(MSE),root MSE(RMSE),mean absolute error(MAE),and R2 were all used in the conducted experiments to assess the proposed approach,with final scores of(0.61),(430.81),(19.12),and(11.09),***,we compared the proposed model to current machine-learning regression models;such as non-optimized LSTM,bidirectional LSTM(BiLSTM),gated recurrent unit(GRU),and convolutional LSTM(ConvLSTM).It was found that the proposed approach achieved the lowest RMSE of(19.12).In addition,the experimental results show that the proposed model has R-with a value outperforming the other models,which confirms the superiority of the proposed *** the other hand,a statistical analysis is performed to measure the significance and stability of the proposed approach and the recorded results proved the expected perfomance.
Eye-tracking technology has long been a valuable tool across various domains, and recent advancements in neural networks have significantly expanded its versatility and potential. However, real-world applications cont...
详细信息
Battery technology is advancing due to the requirement to store reliable energy in electric transportation systems and portable electronics devices. Assessing battery conditions and increasing the autonomy of electric...
详细信息
This paper considers a linear quadratic Gaussian (LQG) control problem with constraints on system inputs and random packet losses occurring on the communication channel between plant and controller. It is well known t...
详细信息
This paper considers a linear quadratic Gaussian (LQG) control problem with constraints on system inputs and random packet losses occurring on the communication channel between plant and controller. It is well known that, in the absence of constraints, the Separation Principle between estimator and controller holds when the channel employs a TCP-like protocol but not so under a UDP-like protocol. This paper gives a counterexample that shows that, under a model predictive control (MPC) scheme that handles the constraints, the Separation Principle does not hold even in the TCP-like case. Theoretical analysis characterizes and reveals a trade-off between estimation errors in the estimator and prediction errors in the controller. Counterintuitively, the poorer on-average performance of the estimator in the UDP case may be compensated by smaller prediction errors in the controller.
This study proposes methods that can be used to examine and interpret comments that users have made after watching videos on YouTube on a particular topic. YouTube tutorials are very popular among young people. They h...
详细信息
The existing normative and technical documentation of operating organizations does not allow for the reliable organization of the minimal possible inspection zone. The article presents research on the implementation o...
The existing normative and technical documentation of operating organizations does not allow for the reliable organization of the minimal possible inspection zone. The article presents research on the implementation of justified inspection zone for fault location on overhead transmission lines of 110 kV and above. The fault location research was carried out on an imitation model in the Simulink / MATLAB software package. Fault location formulae developed by the authors were used under consideration of multitude factors influencing the measurement using the Monte Carlo method. Only the methodological error of fault location was taken into account in the calculation for the implementation of the inspection zone. The most probable (justified) inspection zone was calculated based on the values of fault locations obtained using the calculation formulae. The generalized Gaussian distribution (GGD) and the functions of mathematical expectation and standard deviation were used to implement the justified inspection zone.
This paper builds on a body of work in the community which is focussed on sharing learning and teaching resources, especially those which might support a first course in control. Here attention is given to some of the...
详细信息
This paper builds on a body of work in the community which is focussed on sharing learning and teaching resources, especially those which might support a first course in control. Here attention is given to some of the mathematical, analytical and numerical computations which are required to support simple system and feedback analysis and design. The aim is to provide resources which allow students to focus on core concepts and understanding so that the numerical computations are not an obstacle to their investigations. More specifically, this paper focuses on a number of MATLAB livescript files which have been produced to help students visualise the impact of parameter and design choices on system behaviour, while simultaneously empowering them to understand the source code and thus upskill them for the future. The paper gives an overview of the livescripts available so users can decide whether these could be useful in their own context; all are freely available on the author's website (Rossiter, 2021).
This work has as main objective the development of a soft-sensor to classify, in real time, the behaviors of drivers when they are at the controls of a vehicle. Efficient classification of drivers’ behavior while dri...
详细信息
International trade and logistics are subject to factors including geopolitical instability, climate change, and black swan events such as the unforeseen closure of the Suez Canal. The problem of predicting local pric...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
暂无评论