In this paper, battery charge and discharge simulation are shown for one battery energy storage system. For this purpose, the two-stage bidirectional power converter is used to achieve power conversion from battery st...
详细信息
Ice gouging is one of the major menaces to the subsea pipelines crossing the Arctic (e.g., Beaufort Sea) or the non-Arctic (e.g., Caspian Sea) shallow waters. Burial of the sea-bottom-founded infrastructures is regard...
详细信息
ISBN:
(纸本)9781613998526
Ice gouging is one of the major menaces to the subsea pipelines crossing the Arctic (e.g., Beaufort Sea) or the non-Arctic (e.g., Caspian Sea) shallow waters. Burial of the sea-bottom-founded infrastructures is regarded as a feasible method for protection of the subsea assets against the ice gouging threat. These pipelines are commonly embedded underneath the deepest ice-scoured records in the area, whereas the pipeline system is still threatened by the ice-induced soil displacement developed into the ice tip owing to the shear resistance of the seabed soil. Determination of the sub-gouge soil displacements is a governing design factor for the subsea structures in the Arctic offshore that commonly need costly laboratory studies and long-running finite element (FE) analyses to guarantee the operational integrity of the subsea pipeline against the ice-gouging event. Thus, the industry is still seeking more cost-effective, reliable, and faster alternative approaches for simulation of the iceberg-seabed-pipeline interaction process to minimize the collision risk of ice keels with the subsea structures. Recently, the application of machine learning (ML) in different fields has witnessed impressive growth since the ML technology is sufficiently precise, quick, reliable, and cost-effective to model various linear and non-linear problems. In this study, three robust ML algorithms comprising the Decision Tree Regression (DTR), Random Forest Regression (RFR), and Extra Tree Regression (ETR) models were used for the first time to simulate the iceberg-seabed interaction process in the sandy seabed. Using the parameters governing the ice-seabed interaction mechanism, a set of the DTR, RFR, and ETR models were developed. To verify the ML models, a comprehensive dataset was constructed and the data was divided into two sub-samples including the training (70% of data) and testing (the remaining 30% of the data) datasets. Subsequently, for the DTR, RFR, and ETR models, several analy
To reach carbon neutrality by 2050 with initiatives under the Paris Agreement on climate change, atmospheric greenhouse gas emission, primarily carbon dioxide emission, is under *** capture and storage systems are bei...
详细信息
The problem of class imbalance has always been considered as a significant challenge to traditional machine learning and the emerging deep learning research communities. A classification problem can be considered as c...
详细信息
To improve the precision and robustness of control systems, this paper investigates the integration of three different control methodologies: Proportional-Integral-Derivative (PID) control, sliding motion control, and...
详细信息
For many cloud-based IoT device learning applications, including sensible clinical data analytics, phrase search - which allows retrieval of files containing a given term - plays a crucial role. In order to prevent se...
详细信息
ISBN:
(纸本)9798350375237
For many cloud-based IoT device learning applications, including sensible clinical data analytics, phrase search - which allows retrieval of files containing a given term - plays a crucial role. In order to prevent sensitive information from being exposed by third-party providers, data owners typically encrypt files (such as medical records) before sending them to the cloud. Having said that, this does make the search operation quite challenging and current searchable encryption systems for multiple keyword searches can't do word searches because they can't determine the location connection of multiple key phrases in a query word using encrypted data stored on the cloud server side. This study presents a model called MCLPS, which stands for 'Modified Cyber Law for Phrase Searching.' Its purpose is to identify specific phrases in a cloud environment. To test how well the model works, it is cross-validated with the traditional BET. The safety of information in the cloud has long been an important concern for cloud service providers and their clients, despite the fact that there are several elements that could affect data security during searches. The reason behind this is the presence of dangers posed by both external data sources and internal partners, namely, their employees. Therefore, due to its massive structure, maintaining this security perfect is an ongoing headache and difficult effort in the cloud. In most cases, this is achieved by encrypting data at all times and taking extra precautions to ensure that data is not compromised during the audition or any other internal exercises. For safe phrase search in cloud IoT, this study suggested the MCLPS model and the BET encryption technique. The data integration, recovery, indexing, sliding, encryption, decryption, and transfer processes are all encompassed in the suggested works. This proposed study introduces a new approach to encrypted searching that allows encrypted phrase searches, and the MCLPS ad BET proced
Oral cancer remains a critical global health challenge, characterized by high morbidity and mortality due to late-stage diagnosis. This paper addresses the need for improved diagnostic accuracy by introducing a novel ...
详细信息
In the current era of information technology,students need to learn modern programming languages effi*** art of teaching/learning program-ming requires many logical and conceptual *** it’s a challenging task for the i...
详细信息
In the current era of information technology,students need to learn modern programming languages effi*** art of teaching/learning program-ming requires many logical and conceptual *** it’s a challenging task for the instructors/learners to teach/learn these programming languages effectively and effi*** mapping is a useful visual tool for establishing ideas and connecting them to solve *** research proposed an effective way to teach programming languages through visual *** experimental study uses a mind mapping tool to teach two programming environments:Text-based Programming and Blocks-based *** performed the experiments with one hundred and sixty undergraduate students of two public sector universities in the Asia Pacific *** different instructional approaches,including block-based language(BBL),text-based languages(TBL),mind map with text-based language(MMTBL)and mind mapping with block-based(MMBBL)are used for this *** results show that instructional approaches using a mind mapping tool to help students solve given tasks in their critical thinking are more effective than other instructional techniques.
Optimization plays an effective role in various disciplines of science and *** problems should either be optimized using the appropriate method(i.e.,minimization or maximization).Optimization algorithms are one of the...
详细信息
Optimization plays an effective role in various disciplines of science and *** problems should either be optimized using the appropriate method(i.e.,minimization or maximization).Optimization algorithms are one of the efficient and effective methods in providing quasioptimal solutions for these type of *** this study,a new algorithm called the Mutated Leader Algorithm(MLA)is *** main idea in the proposed MLA is to update the members of the algorithm population in the search space based on the guidance of a mutated *** addition to information about the best member of the population,themutated leader also contains information about the worst member of the population,as well as other normal members of the *** proposed MLA is mathematically modeled for implementation on optimization problems.A standard set consisting of twenty-three objective functions of different types of unimodal,fixed-dimensional multimodal,and high-dimensional multimodal is used to evaluate the ability of the proposed algorithm in ***,the results obtained from theMLA are compared with eight well-known *** results of optimization of objective functions show that the proposed MLA has a high ability to solve various optimization ***,the analysis and comparison of the performance of the proposed MLA against the eight compared algorithms indicates the superiority of the proposed algorithm and ability to provide more suitable quasi-optimal solutions.
An innovative microcrystalline cellulose(MCC)natural fibre powder-reinforced PLA biocomposite was investigated using the hand lay-up *** polymer matrix composite(PMC)samples were prepared by varying the weight percent...
详细信息
An innovative microcrystalline cellulose(MCC)natural fibre powder-reinforced PLA biocomposite was investigated using the hand lay-up *** polymer matrix composite(PMC)samples were prepared by varying the weight percentages(wt.%)of both PLA matrix and MCC reinforcement:pure PLA/100:0,90:10,80:20,70:30,60:40 and 50:50 wt.%,*** the results obtained,MCC powder,with its impressive aspect ratio,proved to be an ideal reinforcement for the PLA,exhibiting exceptional mechanical *** was evident that the 80:20 wt.%biocomposite sample exhibited the maximum improvement in the tensile,flexural,notched impact,compressive strength and hardness by 28.85%,20.00%,91.66%,21.53%and 35.82%,respectively compared to the pure PLA ***,during the thermogravimetric analysis(TGA),the same 80:20 wt.%biocomposite sample showed a minimum weight loss of 20%at 400℃,among *** morphological study using Field Emission Scanning Electron Microscopy(FE-SEM)revealed that the uniform distribution of cellulose reinforcement in the PLA matrix actively improved the mechanical properties of the biocomposites,especially the optimal 80:20 wt.%***,it was evident that the optimal PLA/cellulose biocomposite sample could be a suitable and alternative sustainable,environmentally friendly and biodegradable material for semi/structural applications,replacing synthetic and traditional components.
暂无评论