The intense increase in the installed capacity of wind farms has required a computationally efficient dynamic equivalent model of wind *** types of wind-farm modelling aim to identify the accuracy and simulation time ...
详细信息
The intense increase in the installed capacity of wind farms has required a computationally efficient dynamic equivalent model of wind *** types of wind-farm modelling aim to identify the accuracy and simulation time in the presence of the power *** this study,dynamic simulation of equivalent models of a sample wind farm,including single-turbine representation,multiple-turbine representation,quasi-multiple-turbine representation and full-turbine representation models,are performed using a doubly-fed induction generator wind turbine model developed in DIgSILENT *** developed doubly-fed induction generator model in DIgSILENT is intended to simulate inflow wind turbulence for more accurate *** wake effects between wind turbines for the fullturbine representation and multiple-turbine representation models have been considered using the Jensen *** developed model improves the extraction power of the turbine according to the layout of the wind *** accuracy of the mentioned methods is evaluated by calculating the output parameters of the wind farm,including active and reactive powers,voltage and instantaneous flicker *** study was carried out on a sample wind farm,which included 39 wind *** simulation results confirm that the computational loads of the single-turbine representation(STR),the multiple-turbine representation and the quasi-multiple-turbine representation are 1/39,1/8 and 1/8 times the full-turbine representation model,*** the other hand,the error of active power(voltage)with respect to the full-turbine representation model is 74.59%(1.31%),43.29%(0.31%)and 7.19%(0.11%)for the STR,the multiple-turbine representation and the quasi-multiple representation,respectively.
Fruit safety is a critical component of the global economy, particularly within the agricultural sector. There has been a recent surge in the incidence of diseases affecting fruits, leading to economic setbacks in agr...
详细信息
Integrating visible light communication (VLC) with the reconfigurable intelligent surface (RIS) significantly enhances physical layer security by enabling precise directional signal control and dynamic adaptation to t...
详细信息
We study the problem of game-theoretic robot allocation where two players strategically allocate robots to compete for multiple sites of interest. Robots possess offensive or defensive capabilities to interfere and we...
详细信息
In recent years,intelligent robots are extensively applied in the field of the industry and intelligent rehabilitation,wherein the human-robot interaction(HRI)control strategy is a momentous part that needs to be ***,...
详细信息
In recent years,intelligent robots are extensively applied in the field of the industry and intelligent rehabilitation,wherein the human-robot interaction(HRI)control strategy is a momentous part that needs to be ***,the efficacy and robustness of the HRI control algorithm in the presence of unknown external disturbances deserve to be *** deal with these urgent issues,in this study,artificial systems,computational experiments and a parallel execution intelligent control framework are constructed for the HRI *** upper limb-robotic exoskeleton system is re-modelled as an artificial *** on surface electromyogram-based subject's active motion intention in the practical system,a non-convex function activated anti-disturbance zeroing neurodynamic(NC-ADZND)controller is devised in the artificial system for parallel interaction and HRI control with the practical ***,the linear activation function-based zeroing neurodynamic(LAF-ZND)controller and proportionalderivative(posterior deltoid(PD))controller are presented and *** results substantiate the global convergence and robustness of the proposed controller in the presence of different external *** addition,the simulation results verify that the NC-ADZND controller is better than the LAF-ZND and the PD controllers in respect of convergence order and anti-disturbance characteristics.
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communicati...
详细信息
In telemedicine applications, it is crucial to ensure the authentication, confidentiality, and privacy of medical data due to its sensitive nature and the importance of the patient information it contains. Communication through open networks is insecure and has many vulnerabilities, making it susceptible to unauthorized access and misuse. Encryption models are used to secure medical data from unauthorized access. In this work, we propose a bit-level encryption model having three phases: preprocessing, confusion, and diffusion. This model is designed for different types of medical data including patient information, clinical data, medical signals, and images of different modalities. Also, the proposed model is effectively implemented for grayscale and color images with varying aspect ratios. Preprocessing has been applied based on the type of medical data. A random permutation has been used to scramble the data values to remove the correlation, and multilevel chaotic maps are fused with the cyclic redundancy check method. A circular shift is used in the diffusion phase to increase randomness and security, providing protection against potential attacks. The CRC method is further used at the receiver side for error detection. The performance efficiency of the proposed encryption model is proved in terms of histogram analysis, information entropy, correlation analysis, signal-to-noise ratio, peak signal-to-noise ratio, number of pixels changing rate, and unified average changing intensity. The proposed bit-level encryption model therefore achieves information entropy values ranging from 7.9669 to 8.000, which is close to the desired value of 8. Correlation coefficient values of the encrypted data approach to zero or are negative, indicating minimal correlation in encrypted data. Resistance against differential attacks is demonstrated by NPCR and UACI values exceeding 0.9960 and 0.3340, respectively. The key space of the proposed model is 1096, which is substantially mor
The ever-increasing number of Internet-of-Thing devices requires the development of edge-computing platforms to address the associated demand for big data processing at low power consumption while minimizing cloud com...
详细信息
Fully Homomorphic Encryption (FHE) allows computational processing of encrypted data on cloud servers, providing high security and enabling safe data utilization. As homomorphic multiplication progresses with encrypte...
详细信息
The growing concerns over mitigating climate change effects resulted in power system planning and generation expansion strategies that aim in increasing penetration of intermittent renewable energy sources (RES) to fu...
详细信息
With the emphasis on healthcare, early childhood education, and fitness, noninvasive measurement and recognition methods have received more attention. Pressure sensing has been extensively studied because of its advan...
详细信息
暂无评论