Establishing early warning systems and efficient management of water resources in tidal reaches is crucial for achieving adequate flood protection. In tidal reaches, the river stage interacts non-linearly with tides (...
详细信息
Nowadays, high energy amount is being wasted by computing servers and personal electronic devices, which produce a high amount of carbon dioxide. Thus, it is required to decrease energy usage and pollution. Many appli...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which is directly related to the detection reliability and *** this paper,a strategy is proposed to integrate three currently competitive WA's evaluation ***,a conventional evaluation method based on AEF statistical indicators is *** evaluation approaches include competing AEF-based predicted value intervals,and AEF classification based on fuzzy *** AEF attributes contribute to a more accurate AEF classification to different *** resulting dynamic weighting applied to these attributes improves the classification *** evaluation method is applied to evaluate the WA of a particular AEF,to obtain the corresponding evaluation *** integration in the proposed strategy takes the form of a score *** cumulative score levels correspond to different final WA *** imaging is performed to visualize thunderstorm activities using those AEFs already evaluated to exhibit thunderstorm *** results confirm that the proposed strategy effectively and reliably images thunderstorms,with a 100%accuracy of WA *** is the first study to design an integrated thunderstorm detection strategy from a new perspective of WA evaluation,which provides promising solutions for a more reliable and flexible thunderstorm detection.
In recent years, Creating Shared Value (CSV), a management strategy based on the concept of creating both economic and social value for a company, has been attracting attention, and companies are trying to put it into...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS *** this paper,a Fuzzy C-Means(FCM)clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by ***,a time series dataset is created in the time domain using AEFS *** AEFS-based weather is evaluated according to the time-series Membership Degree(MD)changes obtained by inputting this dataset into the ***,thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF ***,a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space ***,the rationality and reliability of the proposed method are verified by combining radar charts and expert *** results confirm that this method accurately characterizes the weather attributes and changes in the AEFS,and a negative distance-MD correlation is obtained for the first *** detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a vi...
详细信息
Forecasting river flow is crucial for optimal planning,management,and sustainability using freshwater *** machine learning(ML)approaches have been enhanced to improve streamflow *** techniques have been viewed as a viable method for enhancing the accuracy of univariate streamflow estimation when compared to standalone *** researchers have also emphasised using hybrid models to improve forecast ***,this paper conducts an updated literature review of applications of hybrid models in estimating streamflow over the last five years,summarising data preprocessing,univariate machine learning modelling strategy,advantages and disadvantages of standalone ML techniques,hybrid models,and performance *** study focuses on two types of hybrid models:parameter optimisation-based hybrid models(OBH)and hybridisation of parameter optimisation-based and preprocessing-based hybridmodels(HOPH).Overall,this research supports the idea thatmeta-heuristic approaches precisely improveML ***’s also one of the first efforts to comprehensively examine the efficiency of various meta-heuristic approaches(classified into four primary classes)hybridised with ML *** study revealed that previous research applied swarm,evolutionary,physics,and hybrid metaheuristics with 77%,61%,12%,and 12%,***,there is still room for improving OBH and HOPH models by examining different data pre-processing techniques and metaheuristic algorithms.
Twitter is the best source for sentiment analysis, product reviews, current issues, etc. Sentiment analysis extracts positive and negative opinions from the Twitter data set, and R studio provides the best environment...
详细信息
The goal of the proposed system is to identify whether a video has endured software manipulation or not. This system specially deals with identifying deepfake videos from real ones. As new techniques emerged to make d...
详细信息
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(...
详细信息
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(BPSK)modulation and can be operated with two frequency bands,868 and 915 *** frequency noise could interfere with the BPSK signal,which causes distortion to the signal before its arrival at ***,filtering the BPSK signal from noise is essential to ensure carrying the signal from the sen-der to the receiver with less ***,removing signal noise in the BPSK signal is necessary to mitigate its negative sequences and increase its capability in industrial wireless sensor ***,researchers have reported a posi-tive impact of utilizing the Kalmen filter in detecting the modulated signal at the receiver side in different communication systems,including ***-while,artificial neural network(ANN)and machine learning(ML)models outper-formed results for predicting signals for detection and classification *** paper develops a neural network predictive detection method to enhance the performance of BPSK ***,a simulation-based model is used to generate the modulated signal of BPSK in the IEEE802.15.4 wireless personal area network(WPAN)***,Gaussian noise was injected into the BPSK simulation *** reduce the noise of BPSK phase signals,a recurrent neural networks(RNN)model is implemented and integrated at the receiver side to esti-mate the BPSK’s phase *** evaluated our predictive-detection RNN model using mean square error(MSE),correlation coefficient,recall,and F1-score *** result shows that our predictive-detection method is superior to the existing model due to the low MSE and correlation coefficient(R-value)metric for different signal-to-noise(SNR)*** addition,our RNN-based model scored 98.71%and 96.34%based on recall and F1-score,respectively.
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart hom...
详细信息
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)*** into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart *** Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger *** work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the *** simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a *** is done to measure the system's consistency across a variety of device *** experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.
暂无评论