Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper ...
详细信息
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper explores the effects of PV module ageing on the PV array power,and the power gains and costs of rearranging and recabling aged PV modules in a PV *** numerical PV array model is first revised to account for module ageing,rearrangement and recabling,with the relevant equations presented *** updated numerical model is then used to obtain the array powers for seven different PV *** power results are then analysed in view of the attributes of the seven PV array examples.A guiding method to recommend recabling after rearranging aged modules is then proposed,leading to further significant power gains,while eliminating intra-row *** certain conditions are met,it was shown that recabling PV modules after rearranging them may lead to further significant power gains,reaching 57%and 98%in two considered PV array *** gains are possible in other arrays.A cost-benefit analysis weighing annual power gains versus estimated recabling costs is also given for the seven considered PV array examples to guide recabling decisions based on technical and economic *** the considered examples,recabling costs can be recovered in<4 *** with the powers of the aged arrays,power gains due to our proposed rearranging and recabling the PV arrays ranged between 73%and 131%in the considered examples—well over the gains reported in the ***,the cost of our static module rearrangement and recabling method outshines the costs of dynamic reconfiguration methods recently published in the literature.
Vision sensors are versatile and can capture a wide range of visual cues, such as color, texture, shape, and depth. This versatility, along with the relatively inexpensive availability of machine vision cameras, playe...
详细信息
Vision sensors are versatile and can capture a wide range of visual cues, such as color, texture, shape, and depth. This versatility, along with the relatively inexpensive availability of machine vision cameras, played an important role in adopting vision-based environment perception systems in autonomous vehicles (AVs). However, vision-based perception systems can be easily affected by glare in the presence of a bright source of light, such as the sun or the headlights of the oncoming vehicle at night or simply by light reflecting off snow or ice-covered surfaces;scenarios encountered frequently during driving. In this paper, we investigate various glare reduction techniques, including the proposed saturated pixel-aware glare reduction technique for improved performance of the computer vision (CV) tasks employed by the perception layer of AVs. We evaluate these glare reduction methods based on various performance metrics of the CV algorithms used by the perception layer. Specifically, we considered object detection, object recognition, object tracking, depth estimation, and lane detection which are crucial for autonomous driving. The experimental findings validate the efficacy of the proposed glare reduction approach, showcasing enhanced performance across diverse perception tasks and remarkable resilience against varying levels of glare. IEEE
Modern apps require high computing resources for real-time data processing, allowing app users (AUs) to access real-time information. Edge computing (EC) provides dynamic computing resources to AUs for real-time data ...
详细信息
Modern apps require high computing resources for real-time data processing, allowing app users (AUs) to access real-time information. Edge computing (EC) provides dynamic computing resources to AUs for real-time data processing. However, due to resources and coverage constraints, edge servers (ESs) in specific areas can only serve a limited number of AUs. Hence, the app user allocation problem (AUAP) becomes challenging in the EC environment. This paper proposes a quantum-inspired differential evolution algorithm (QDE-UA) for efficient user allocation in the EC environment. The quantum vector is designed to provide a complete solution to the AUAP. The fitness function considers the minimum use of ES, user allocation rate (UAR), energy consumption, and load balance. Extensive simulations and hypotheses-based statistical analyses (ANOVA, Friedman test) are performed to show the significance of the proposed QDE-UA. The results indicate that QDE-UA outperforms the majority of the existing strategies with an average UAR improvement of 112.42%, and 140.62% enhancement in load balance while utilizing 13.98% fewer ESs. Due to the higher UAR, QDE-UA shows 59.28% higher total energy consumption on average. However, the lower energy consumption per AU is evidence of its energy efficiency. IEEE
Faults in an Induction Motor (IM) can lead to unexpected downtime, resulting in considerable economic and productivity losses. From existing literature, conventional fault diagnosis approaches in an IM struggle to rel...
详细信息
The substring edit error replaces a substring u of x with another string v, where the lengths of u and v are bounded by a given constant k. It encompasses localized insertions, deletions, and substitutions within a wi...
详细信息
In this paper, we present a new intra-body communication technology that uses capacitive backscatter. The main goal of this technology is to allow for the transmission of binary IDs between a skin-coupled transceiver ...
详细信息
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB...
详细信息
The steady-state security region(SSR)offers ro-bust support for the security assessment and control of new power systems with high uncertainty and ***,accurately solving the steady-state security region boundary(SS-RB),which is high-dimensional,non-convex,and non-linear,presents a significant *** address this problem,this paper proposes a method for approximating the SSRB in power systems using the feature non-linear converter and improved oblique decision ***,to better characterize the SSRB,boundary samples are generated using the proposed sampling *** samples are distributed within a limited distance near the ***,to handle the high-dimensionality,non-convexity and non-linearity of the SSRB,boundary samples are converted from the original power injection space to a new fea-ture space using the designed feature non-linear ***-sequently,in this feature space,boundary samples are linearly separated using the proposed information gain rate based weighted oblique decision ***,the effectiveness and generality of the proposed sampling method are verified on the WECC 3-machine 9-bus system and IEEE 118-bus system.
Remote sensing is of great importance for analyzing and studying various phenomena occurrence and development on *** is possible to extract features specific to various fields of application with the application of mo...
详细信息
Remote sensing is of great importance for analyzing and studying various phenomena occurrence and development on *** is possible to extract features specific to various fields of application with the application of modern machine learning techniques,such as Convolutional Neural Networks(CNN)on MultiSpectral Images(MSI).This systematic review examines the application of 1D-,2D-,3D-,and 4D-CNNs to MSI,following Preferred Reporting Items for Systematic Reviews and Meta-Analyses(PRISMA)*** review addresses three Research Questions(RQ):RQ1:“In which application domains different CNN models have been successfully applied for processing MSI data?”,RQ2:“What are the commonly utilized MSI datasets for training CNN models in the context of processing multispectral satellite imagery?”,and RQ3:“How does the degree of CNN complexity impact the performance of classification,regression or segmentation tasks for multispectral satellite imagery?”.Publications are selected from three databases,Web of science,IEEE Xplore,and *** on the obtained results,the main conclusions are:(1)The majority of studies are applied in the field of agriculture and are using Sentinel-2 satellite data;(2)Publications implementing 1D-,2D-,and 3D-CNNs mostly utilize *** 4D-CNN,there are limited number of studies,and all of them use segmentation;(3)This study shows that 2D-CNNs prevail in all application domains,but 3D-CNNs prove to be better for spatio-temporal pattern recognition,more specifically in agricultural and environmental monitoring applications.1D-CNNs are less common compared to 2D-CNNs and 3D-CNNs,but they show good performance in spectral analysis tasks.4D-CNNs are more complex and still underutilized,but they have potential for complex data *** details about metrics according to each CNN are provided in the text and supplementary files,offering a comprehensive overview of the evaluation metrics for each type of machine learning technique
The earthquake early warning(EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is ...
详细信息
The earthquake early warning(EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is extracted using the primary wave earthquake precursor signal and site-specific *** Japan's earthquake magnitude dataset, there is a chance of a high imbalance concerning the earthquakes above strong impact. This imbalance causes a high prediction error while training advanced machine learning or deep learning models. In this work, Conditional Tabular Generative Adversarial Networks(CTGAN), a deep machine learning tool, is utilized to learn the characteristics of the first arrival of earthquake P-waves and generate a synthetic dataset based on this information. The result obtained using actual and mixed(synthetic and actual) datasets will be used for training the stacked ensemble magnitude prediction model, MagPred, designed specifically for this study. There are 13295, 3989, and1710 records designated for training, testing, and validation. The mean absolute error of the test dataset for single station magnitude detection using early three, four, and five seconds of P wave are 0.41, 0.40,and 0.38 MJMA. The study demonstrates that the Generative Adversarial Networks(GANs) can provide a good result for single-station magnitude prediction. The study can be effective where less seismic data is available. The study shows that the machine learning method yields better magnitude detection results compared with the several regression models. The multi-station magnitude prediction study has been conducted on prominent Osaka, Off Fukushima, and Kumamoto earthquakes. Furthermore, to validate the performance of the model, an inter-region study has been performed on the earthquakes of the India or Nepal region. The study demonstrates that GANs can discover effective magnitude estimation compared with non-GAN-based methods. This has a high potential for wid
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet...
详细信息
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These proprietary models are vulnerable to model extraction attacks due to their commercial value. In this paper, we propose a time-efficient model extraction attack framework called Swift Theft that aims to steal the functionality of cloud-based deep neural network models. We distinguish Swift Theft from the existing works with a novel distribution estimation algorithm and reference model settings, finding the most informative query samples without querying the victim model. The selected query samples can be applied to various cloud models with a one-time selection. We evaluate our proposed method through extensive experiments on three victim models and six datasets, with up to 16 models for each dataset. Compared to the existing attacks, Swift Theft increases agreement(i.e., similarity) by 8% while consuming 98% less selecting time.
暂无评论