The intense increase in the installed capacity of wind farms has required a computationally efficient dynamic equivalent model of wind *** types of wind-farm modelling aim to identify the accuracy and simulation time ...
详细信息
The intense increase in the installed capacity of wind farms has required a computationally efficient dynamic equivalent model of wind *** types of wind-farm modelling aim to identify the accuracy and simulation time in the presence of the power *** this study,dynamic simulation of equivalent models of a sample wind farm,including single-turbine representation,multiple-turbine representation,quasi-multiple-turbine representation and full-turbine representation models,are performed using a doubly-fed induction generator wind turbine model developed in DIgSILENT *** developed doubly-fed induction generator model in DIgSILENT is intended to simulate inflow wind turbulence for more accurate *** wake effects between wind turbines for the fullturbine representation and multiple-turbine representation models have been considered using the Jensen *** developed model improves the extraction power of the turbine according to the layout of the wind *** accuracy of the mentioned methods is evaluated by calculating the output parameters of the wind farm,including active and reactive powers,voltage and instantaneous flicker *** study was carried out on a sample wind farm,which included 39 wind *** simulation results confirm that the computational loads of the single-turbine representation(STR),the multiple-turbine representation and the quasi-multiple-turbine representation are 1/39,1/8 and 1/8 times the full-turbine representation model,*** the other hand,the error of active power(voltage)with respect to the full-turbine representation model is 74.59%(1.31%),43.29%(0.31%)and 7.19%(0.11%)for the STR,the multiple-turbine representation and the quasi-multiple representation,respectively.
In numerous real-world healthcare applications,handling incomplete medical data poses significant challenges for missing value imputation and subsequent clustering or classification *** approaches often rely on statis...
详细信息
In numerous real-world healthcare applications,handling incomplete medical data poses significant challenges for missing value imputation and subsequent clustering or classification *** approaches often rely on statistical methods for imputation,which may yield suboptimal results and be computationally *** paper aims to integrate imputation and clustering techniques to enhance the classification of incomplete medical data with improved *** classification methods are ill-suited for incomplete medical *** enhance efficiency without compromising accuracy,this paper introduces a novel approach that combines imputation and clustering for the classification of incomplete ***,the linear interpolation imputation method alongside an iterative Fuzzy c-means clustering method is applied and followed by a classification *** effectiveness of the proposed approach is evaluated using multiple performance metrics,including accuracy,precision,specificity,and *** encouraging results demonstrate that our proposed method surpasses classical approaches across various performance criteria.
The thyroid gland, a pivotal regulator of essential physiological functions, orchestrates the production and release of thyroid hormones, playing a vital role in metabolism, growth, development, and overall bodily fun...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention...
详细信息
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)*** Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent *** this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN *** model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant *** adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack *** proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble *** proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in *** provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving *** comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing *** results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
Manufacturers must be able to figure out the most suitable technique capable of generating rapid and accurate performance when developing a precise modelling approach for the development of an efficient machining proc...
详细信息
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented *** narrow beam usage in add...
详细信息
Enabling high mobility applications in millimeter wave(mmWave)based systems opens up a slew of new possibilities,including vehicle communi-cations in addition to wireless virtual/augmented *** narrow beam usage in addition to the millimeter waves sensitivity might block the coverage along with the reliability of the mobile *** this research work,the improvement in the quality of experience faced by the user for multimedia-related applications over the millimeter-wave band is *** high attenuation loss in high frequencies is compensated with a massive array structure named Multiple Input and Multiple Output(MIMO)which is utilized in a hyperdense environment called heterogeneous networks(HetNet).The optimization problem which arises while maximizing the Mean Opinion Score(MOS)is analyzed along with the QoE(Quality of Experience)metric by considering the Base Station(BS)powers in addition to the needed Quality of Service(QoS).Most of the approaches related to wireless network communication are not suitable for the millimeter-wave band because of its problems due to high complexity and its dynamic *** a deep reinforcement learning framework is developed for tackling the same opti-mization *** this work,a Fuzzy-based Deep Convolutional Neural Net-work(FDCNN)is proposed in addition to a Deep Reinforcing Learning Framework(DRLF)for extracting the features of highly correlated *** investigational results prove that the proposed method yields the highest satisfac-tion to the user by increasing the number of antennas in addition with the small-scale antennas at the base *** proposed work outperforms in terms of MOS with multiple antennas.
Handwritten documents generated in our day-to-day office work, class room and other sectors of society carry vital information. Automatic processing of these documents is a pipeline of many challenging steps. The very...
详细信息
In the field of medical images,pixel-level labels are time-consuming and expensive to acquire,while image-level labels are relatively easier to ***,it makes sense to learn more information(knowledge)from a small numbe...
详细信息
In the field of medical images,pixel-level labels are time-consuming and expensive to acquire,while image-level labels are relatively easier to ***,it makes sense to learn more information(knowledge)from a small number of hard-to-get pixel-level annotated images to apply to different tasks to maximize their usefulness and save time and training *** this paper,using Pixel-Level Labeled Images forMulti-Task Learning(PLDMLT),we focus on grading the severity of fundus images for Diabetic Retinopathy(DR).This is because,for the segmentation task,there is a finely labeled mask,while the severity grading task is without classification *** this end,we propose a two-stage multi-label learning weakly supervised algorithm,which generates initial classification pseudo labels in the first stage and visualizes heat maps at all levels of severity using Grad-Cam to further provide medical interpretability for the classification task.A multitask model framework with U-net as the baseline is proposed in the second stage.A label update network is designed to alleviate the gradient balance between the classification and segmentation *** experimental results show that our PLDMLTmethod significantly outperforms other stateof-the-art methods in DR segmentation on two public datasets,achieving up to 98.897%segmentation *** addition,our method achieves comparable competitiveness with single-task fully supervised learning in the DR severity grading task.
暂无评论