In this paper, a classical PI and an on/off predictive boundary-based predictive controller (BBPC) algorithms are compared and verified using an ASM3-based model of an activated sludge system with a reactor and second...
详细信息
Due to the important part of batteries in industrial systems, its safety analysis has causes widespread attention from researchers, and its effective maintenance decision-making is needed. Data-driven state-of-health ...
Due to the important part of batteries in industrial systems, its safety analysis has causes widespread attention from researchers, and its effective maintenance decision-making is needed. Data-driven state-of-health (SOH) estimation can provide useful information by monitoring historical data during the aging process, but it can be failed in the cross-domain scenarios due to the different data distributions. To tackle this issue, we propose a long short-term memory (LSTM) neural network with an additional fully connected dense as a basic predictor, and apply the pretrain and fine-tuning training algorithm to realize the high-performance prediction. By validated in two real-world datasets, we find that blindly expanding the training set may have a negative impact on model accuracy, and the proposed TL-LSTM can achieve a great performance under the cross-domain tasks.
The significance of palm oil, which contributes 30 % of the world's total vegetable oil production, cannot be overstated. Its numerous applications, ranging from soap to cosmetics, have increased demand, thereby i...
详细信息
This paper presents the design and numerical investigation of a novel, tunable, and highly efficient metal–insulator-metal (MIM) plasmonic device specifically designed for near-infrared (NIR) applications. The device...
详细信息
This paper presents the design and numerical investigation of a novel, tunable, and highly efficient metal–insulator-metal (MIM) plasmonic device specifically designed for near-infrared (NIR) applications. The device leverages strategically placed stub resonators within a MIM waveguide. We introduce two small perturbations, a triangle and a rectangle, to achieve remarkable functional versatility. Comprehensive numerical analysis, employing the finite element method (FEM) and validated by the transmission line method (TLM), demonstrates the working principle and excellent agreement between the approaches. Our simulation-driven approach, utilizing a Genetic Algorithm (GA) for accelerated optimization, was crucial in achieving performance levels difficult or costly to reach through purely experimental methods. The GA enabled efficient exploration of a vast parameter space, iterative refinement of device configurations, and fine-tuning of geometric characteristics. This meticulous optimization allows us to control complex interactions within the simulated structure. The proposed device offers diverse functionalities based on adjusted geometrical parameters, including: A. Flat-top band-pass filtering: Achieving a maximum transmission efficiency of 95.8 % within a compact footprint of 420 nm × 540 nm. B. Dual-band band-pass filtering: Maintaining a high transmission efficiency of 88.4 % within a slightly larger size of 450 nm × 540 nm. C. Triple-band notch filtering: Exhibiting minimum transmission (below 1 %) at specific resonance wavelengths for targeted signal suppression. D. Plasmon-induced transparency (PIT) effect: Offering potential applications in various optical functionalities. And, E. Perfect absorption: Achieving a maximum absorption efficiency of 99.62 %, paving the way for efficient light harvesting and manipulation. This multifunctional plasmonic device excels in its combination of compactness, tunability, and diverse NIR functionalities. It holds promise f
To increase the power density of voltage source converters (VSC) usually use parallel structures. However, parallel VSC will easily introduce circulating current, which can cause a power efficiency decline. This paper...
To increase the power density of voltage source converters (VSC) usually use parallel structures. However, parallel VSC will easily introduce circulating current, which can cause a power efficiency decline. This paper gives a review of the circulating current and the solutions of it. Through the analysis of the principle of circulating current generation and the detail of the solutions, this paper gives an overview of the current research stage of circulating current. The technology can be divided into hardware solutions and software solutions are then analyzed and evaluated.
Protection of the user is the one of primary points within the coming of 5G portable communications. Area protection has recently been broadly tended to within the writing as crucial tricky issues for the client secur...
详细信息
The atmosphere’s fine articulate Matter (PM2.5) poses various health-related risks. Even though multiple efforts have been made to lower the emissions of these substances, the mortality rate is continuously increasin...
详细信息
The Increasing number of smart devices in different forms and capabilities combined with the worldwide adoption of advanced multimedia applications are contributing to the significant growth of the mobile data traffic...
The Increasing number of smart devices in different forms and capabilities combined with the worldwide adoption of advanced multimedia applications are contributing to the significant growth of the mobile data traffic. The fifth generation (5G) and beyond-5G wireless networks aim at providing wireless connectivity with very high data rates, low latency, high reliability, and scalability, and will support the emerging Internet-of-Things (IoT) applications and services with massively interconnected devices [items 1), 2) in the Appendix].
As cyber-attacks become increasingly sophisticated, cybersecurity threats continue to increase. Therefore, it becomes a great challenge to detect, identify and prevent adversary attacks. The inability to detect and av...
详细信息
As cyber-attacks become increasingly sophisticated, cybersecurity threats continue to increase. Therefore, it becomes a great challenge to detect, identify and prevent adversary attacks. The inability to detect and avert such attacks can break down the credibility of security services, e.g. data confidentiality, availability, and integrity. An intrusion detection system aims to detect, identify and respond to malicious activities involving computing and network resources. This is even more difficult when the network contains Internet of Things (IoT) devices. The process of developing an intrusion detection system is a tremendous challenge due to false alarm rates, low detection rates, unbalanced datasets and response time. This paper gives a comprehensive model of a network intrusion detection system (NIDS) by applying supervised and unsupervised machine learning (ML) over the NF-ToN-IoT-v2 dataset. Using supervised learning, implemented by Azure automated ML (AML), it is shown that the best results are achieved by algorithm XGBoostClassifier, obtaining an F-Score of 98.8%. When a custom made automated ML (AE2EML) is implemented, the best results are achieved by Random Forest Classifier, obtaining an F-Score of 98.6%. Using clustering with PCA (Principal Component Analysis), implemented by PyCaret automated ML, the proposed ML-based NIDS achieves a Silhouette score of 0.553, Calinski-Harabasz index of 1533106 and Davies-Bouldin index of 0.631.
The new electrical motor used as the automotive engines seen to be very efficient which use only clean energy generated as one of the efforts to minimize the carbon emissions. The high usage of electric vehicle around...
详细信息
暂无评论