The change of temperature, humidity and moisture content (MC) will lead to the change of mechanical properties of molded fiber products (MFP). However, it is difficult to decouple the effects of temperature, humidity ...
详细信息
The change of temperature, humidity and moisture content (MC) will lead to the change of mechanical properties of molded fiber products (MFP). However, it is difficult to decouple the effects of temperature, humidity and MC on the mechanical properties of MFP, and predict the mechanical properties of MFP during the use. In this study, the laws and mechanism of mechanical properties of MFP with ambient temperature, humidity and MC were studied. The results showed that the direct effect of temperature (20−70 °C) on mechanical properties of MFP was insignificant, and the mechanical properties of MFP were mainly changed by MC. The MC was related to ambient temperature and humidity, and the relationship between the three could be described by the modified Guggenheim-Anderson-de Boer (GAB) model (20−70 °C and 30 %–90 % relative humidity). With the increase of MC, the elastic modulus and fracture strain was increased and decreased linearly, the yield strength and failure strength were presented GaussAmp laws, and the failure strain was presented asymptotic regressed distribution law. Two fracture modes of MFP, brittle fracture and ductile fracture, were revealed by the scanning electron microscopy of the mesoscopic fiber structure of sugarcane bagasse molded fiber products. The mathematical models and the changes of fiber structure were verified by wheat straw molded fiber products and waste paper molded fiber products. This study was contributed to understand the effects and mechanism of the change of temperature, humidity and MC on the mechanical properties of MFP.
In this paper, we study the performance of wireless-powered cluster-based multi-hop cognitive relay networks (MCRNs), where secondary nodes harvest energy from multiple dedicated power beacons (PBs) and share the spec...
详细信息
Permissioned blockchain is a promising methodology to build zero-trust storage foundation with trusted data storage and sharing for the zero-trust network. However, the inherent full-backup feature of the permissioned...
详细信息
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challengin...
详细信息
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challenging to collect defective ***,the complex surface background of polysilicon cell wafers complicates the accurate identification and localization of defective *** paper proposes a novel Lightweight Multiscale Feature Fusion network(LMFF)to address these *** network comprises a feature extraction network,a multi-scale feature fusion module(MFF),and a segmentation ***,a feature extraction network is proposed to obtain multi-scale feature outputs,and a multi-scale feature fusion module(MFF)is used to fuse multi-scale feature information *** order to capture finer-grained multi-scale information from the fusion features,we propose a multi-scale attention module(MSA)in the segmentation network to enhance the network’s ability for small target ***,depthwise separable convolutions are introduced to construct depthwise separable residual blocks(DSR)to reduce the model’s parameter ***,to validate the proposed method’s defect segmentation and localization performance,we constructed three solar cell defect detection datasets:SolarCells,SolarCells-S,and *** and SolarCells-S are monocrystalline silicon datasets,and PVEL-S is a polycrystalline silicon *** results show that the IOU of our method on these three datasets can reach 68.5%,51.0%,and 92.7%,respectively,and the F1-Score can reach 81.3%,67.5%,and 96.2%,respectively,which surpasses other commonly usedmethods and verifies the effectiveness of our LMFF network.
With the participation of large quantities of renewable energy in power system operations,their volatility and intermittence increases the difficulties and challenges of power system economic *** the uncertainty of re...
详细信息
With the participation of large quantities of renewable energy in power system operations,their volatility and intermittence increases the difficulties and challenges of power system economic *** the uncertainty of renewable energy generation,based on the distributionally robust optimization method,a two-stage economic dispatch model is proposed to minimize the total operation *** this paper,it is assumed that the fluctuating of renewable power generation follows the unknown probability distribution that is restricted in an ambiguity set,which is established by utilizing the first-order moment information of available historical ***,the theory of conditional value-at-risk is introduced to transform the model into a tractable model,which we call robust counterpart *** on the stochastic dual dynamic programming method,an improved iterative algorithm is proposed to solve the robust counterpart ***,the convergence optimum can be obtained by the improved iterative algorithm,which performs a forward pass and backward pass repeatedly in each iterative ***,by comparing with other methods,the results on the modified IEEE 6-bus,118-bus,and 300-bus system show the effectiveness and advantages of the proposed model and method.
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communi...
详细信息
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communicating with *** tracking(ET)has become a useful method to detect *** vital aspect of moral erudition is the aptitude to have common visual *** eye-tracking approach offers valuable data regarding the visual behavior of children for accurate and early ***-tracking data can offer insightful information about the behavior and thought processes of people with ASD,but it is important to be aware of its limitations and to combine it with other types of data and assessment techniques to increase the precision of ASD *** operates by scanning the paths of eyes for extracting a series of eye projection points on images for examining the behavior of children with *** purpose of this research is to use deep learning to identify autistic disorders based on eye *** Chaotic Butterfly Optimization technique is used to identify this specific ***,this study develops an ET-based Autism Spectrum Disorder Diagnosis using Chaotic Butterfly Optimization with Deep Learning(ETASD-CBODL)*** presented ETASDCBODL technique mainly focuses on the recognition of ASD via the ET and DL *** accomplish this,the ETASD-CBODL technique exploits the U-Net segmentation technique to recognize interested *** addition,the ETASD-CBODL technique employs Inception v3 feature extraction with CBO algorithm-based hyperparameter ***,the long-shorttermmemory(LSTM)model is exploited for the recognition and classification of *** assess the performance of the ETASD-CBODL technique,a series of simulations were performed on datasets from the figure-shared data *** experimental values of accuracy(99.29%),precision(98.78%),sensitivity(99.29%)and specificity(99.29%)showed a better perfo
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a...
详细信息
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul...
详细信息
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security problems brought by the mobile *** for Android system,due to its open source nature,malicious applications continue to emerge,which greatly threatens the data security of ***,this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and *** conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption,storage overhead and *** experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process *** with the native system,the additional performance overhead is small.
暂无评论