Mineral oil (MO) has long been utilized in high-voltage power transformers, as a cooling and dielectric medium;because of it is availability as it is extracted from fossil oil. Recently, Gas-To-Liquid (GTL) has a sign...
详细信息
A major cause of some of serious issues encountered in a drilling project,including wellbore instability,formation damage,and drilling string stuck e which are known to increase non-productive time(NPT)and hence the d...
详细信息
A major cause of some of serious issues encountered in a drilling project,including wellbore instability,formation damage,and drilling string stuck e which are known to increase non-productive time(NPT)and hence the drilling cost e is what we know as mud *** mud loss can be prevented or at least significantly reduced by taking proper measures beforehand provided the position and intensity of such loss can be properly predicted using an accurate predictor ***,in this study,we used the convolutional neural network(CNN)and hybridized forms of multilayer extreme learning machine(MELM)and least square support vector machine(LSSVM)with the Cuckoo optimization algorithm(COA),particle swarm optimization(PSO),and genetic algorithm(GA)for modeling the mud loss rate based on drilling data,mud properties,and geological information of 305 drilling wells penetrating the Marun *** this purpose,we began by a pre-processing step to attenuate the effect of noise using the Savitzky-Golay *** whole set of available data was divided into the modeling(including 2300 data points)and the validation(including 483 data points)***,the second generation of the non-dominated sorting genetic algorithm(NSGA-Ⅱ)was applied to the modeling data to identify the most significant features for estimating the mud *** results showed that the prediction accuracy increased with the number of selected features,but the increase became negligible when the number of selected features exceeded ***,the following 9 features were selected as input to the intelligent algorithms(IAs):pump pressure,mud weight,fracture pressure,pore pressure,depth,gel 10 min/gel 10 s,fan 600/fan 300,flowrate,and formation *** of the hybrid algorithms and simple forms of LSSVM and CNN to the training data(80%of the modeling data,i.e.1840 data points)showed that all of the models tend to underestimate the mud loss at higher mud loss rates,although the CNN exhibited l
This paper shows a simple, compact and small 8×8 MIMO antenna. The ability of MIMO antennas is to broadcast signals in a various patterns and polarizations is extremely advantageous for contemporary communication...
详细信息
Device-to-device (D2D) communication, in contrast to typical cellular connections, is a direct connection between adjacent mobile users;it skips the base station (BS) and does not rely on network infrastructure to del...
详细信息
A novel method called cooperative communication allows devices with a single antenna to share their antennae and assist other nodes in signal relaying. Thus, enhanced reception reliability, lower power usage, and incr...
详细信息
The large-scale application of renewable energy power generation technology brings new challenges to the operation of traditional power grids andenergy management on the load side. Microgrid can effectively solve this...
详细信息
The large-scale application of renewable energy power generation technology brings new challenges to the operation of traditional power grids andenergy management on the load side. Microgrid can effectively solve this problemby using its regulation and flexibility, and is considered to be an ideal *** traditional method of computing total transfer capability is difficult due tothe central integration of wind farms. As a result, the differential evolutionextreme learning machine is offered as a data mining approach for extractingoperating rules for the total transfer capability of tie-lines in wind-integratedpower systems. K-medoids clustering under the two-dimensional “wind power-load consumption” feature space is used to define representative operational scenarios initially. Then, using stochastic sampling and repetitive power flow, aknowledge base for total transfer capability operating rule mining is ***, a novel method is used to filter redundant characteristics and find featuresthat are closely associated to the total transfer capability in order to decrease theultra-high dimensionality of operational features. Finally, by feeding the trainingdata into the proposed algorithm, the total transfer capability operation rules arederived from the knowledge base. It can be seen that, the proposed algorithmcan optimize the system performance with good accuracy and generality, according to numerical data.
Recent increases in global food demand have made this research and, therefore, the prediction of agricultural commodity prices, almost imperative. The aim of this paper is to build efficient artificial intelligence me...
详细信息
The emergence of pandemic diseases like Covid-19 in recent years has made it more important for Internet of Medical Things (IoMT) environments to build contact between patients and doctors in order to control their he...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs is to extendflexibility into the self-directed,mobile,and wireless domain,in which a cluster of autonomous nodes forms a MANET routing *** Intrusion Detection System(IDS)is a tool that examines a network for mal-icious behavior/policy violations.A network monitoring system is often used to report/gather any suspicious attacks/*** IDS is a software program or hardware system that monitors network/security traffic for malicious attacks,sending out alerts whenever it detects malicious *** impact of Dynamic Source Routing(DSR)in MANETs challenging blackhole attack is investigated in this research *** Cluster Trust Adaptive Acknowledgement(CTAA)method is used to identify unauthorised and malfunctioning nodes in a MANET *** system is active and provides successful delivery of a data packet,which implements Kalman Filters(KF)to anticipate node ***,KF is used to eliminate synchronisation errors that arise during the sending and receiving *** order to provide an energy-efficient solution and to minimize network traffic,route optimization in MANET by using Multi-Objective Particle Swarm Optimization(MOPSO)technique to determine the optimal num-ber of clustered MANET along with energy dissipation in *** to the researchfindings,the proposed CTAA-MPSO achieves a Packet Delivery Ratio(PDR)of 3.3%.In MANET,the PDR of CTAA-MPSO improves CTAA-PSO by 3.5%at 30%malware.
作者:
Singh, AmitSindhu Madhuri, G.Teerthanker Mahaveer University
College of Computing Science & It Department of Computing Science & It Moradabad India
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
On current days, the growing applications in Internet of Things (IoT) is increasing in various real-time sectors as smart city applications (air pollution, atmospheric noise canceling and traffic flow management). Now...
详细信息
暂无评论