An intelligent reflecting surface(IRS),or its various equivalents such as an reconfigurable intelligent surface(RIS), is an emerging technology to control radio signal propagation in wireless systems. An IRS is a digi...
An intelligent reflecting surface(IRS),or its various equivalents such as an reconfigurable intelligent surface(RIS), is an emerging technology to control radio signal propagation in wireless systems. An IRS is a digitally controlled metasurface consisting of a large number of passive reflecting elements, which are connected to a smart controller to enable dynamic adjustments of the amplitude and/or phase of the incident signal on each element independently [1].
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameter...
详细信息
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameters are chosen. The purpose of this research is to present the corrosion prevention mechanism of the PCCP technique by taking into account the effects of duty cycle as well as frequency, modeling the relationships between pulse parameters(frequency and duty cycle) and system outputs(corrosion rate, protective current and pipe-to-soil potential) and finally identifying the most effective protection conditions over a wide range of frequency(2–10 kHz) and duty cycle(25%-75%). For this, pipe-to-soil potential, pH, current and power consumption, corrosion rate, surface deposits and investigation of pitting corrosion were taken into account. To model the input-output relationship in the PCCP method, a data-driven machine learning approach was used by training an artificial neural network(ANN). The results revealed that the PCCP system could yield the best protection conditions at 10 kHz frequency and 50% duty cycle, resulting in the longest protection length with the lowest corrosion rate at a consumption current 0.3 time that of the DCCP method. In the frequency range of 6–10 kHz and duty cycles of 50%-75%, SEM images indicated a uniform distribution of calcite deposits and no pits on cathode surface.
This work provides a basis for studying energy management optimisation in power-split hybrid electric vehicles (PSHEVs) to reduce fuel consumption and increase powertrain efficiency by enforcing a strategy related to ...
详细信息
For the large amount of waste heat wasted in daily life and industrial production,we propose a new type of flexible thermoelectric generators(F-TEGs)which can be used as a large area bionic skin to achieve energy harv...
详细信息
For the large amount of waste heat wasted in daily life and industrial production,we propose a new type of flexible thermoelectric generators(F-TEGs)which can be used as a large area bionic skin to achieve energy harvesting of thermal *** reference to biological structures such as pinecone,succulent,and feathers,we have designed and fabricated a biomimetic flexible TEG that can be applied in a wide temperature range which has the highest temperature energy harvesting capability *** laminated free structure of the bionic F-TEG dramatically increases the efficiency and density of energy *** F-TEGs(single TEG only 101.2 mg in weight),without an additional heat sink,demonstrates the highest output voltage density of 286.1 mV/cm^(2)and the maximum power density is 66.5 mW/m^(2) at a temperature difference of nearly 1000℃.The flexible characteristics of F-TEGs make it possible to collect the diffused thermal energy by flexible attachment to the outer walls of high-temperature pipes and vessels of different diameters and *** work shows a new design and application concept for flexible thermal energy collectors,which fills the gap of flexible energy harvesting in high-temperature environment.
The Internet of Things (IoT) is crucial in various sectors, making IoT networks prime targets for denial of service attacks. Detecting heavy hitters-primary sources of such attacks-is essential for network security. W...
详细信息
This paper presents a coding approach for achieving omnidirectional transmission of certain common signals in massive multi-input multi-output (MIMO) networks such that the received power at any direction in a cell re...
详细信息
Agriculture plays a major role in developing countries like India, however the food security still remains a vital issue. Most of the crops get wasted due to lack of storage facility, transportation, and plant disease...
详细信息
In the field of autonomous robots,achieving complete precision is challenging,underscoring the need for human intervention,particularly in ensuring *** Autonomy Teaming(HAT)is crucial for promoting safe and efficient ...
详细信息
In the field of autonomous robots,achieving complete precision is challenging,underscoring the need for human intervention,particularly in ensuring *** Autonomy Teaming(HAT)is crucial for promoting safe and efficient human-robot collaboration in dynamic indoor *** paper introduces a framework designed to address these precision gaps,enhancing safety and robotic interactions within such *** to our approach is a hybrid graph system that integrates the Generalized Voronoi Diagram(GVD)with spatio-temporal graphs,effectively combining human feedback,environmental factors,and key *** integral component of this system is the improved Node Selection Algorithm(iNSA),which utilizes the revised Grey Wolf Optimization(rGWO)for better adaptability and ***,an obstacle tracking model is employed to provide predictive data,enhancing the efficiency of the *** insights play a critical role,from supplying initial environmental data and determining key waypoints to intervening during unexpected challenges or dynamic environmental *** simulation and comparison tests confirm the reliability and effectiveness of our proposed model,highlighting its unique advantages in the domain of *** comprehensive approach ensures that the system remains robust and responsive to the complexities of real-world applications.
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
暂无评论