The intense increase in the installed capacity of wind farms has required a computationally efficient dynamic equivalent model of wind *** types of wind-farm modelling aim to identify the accuracy and simulation time ...
详细信息
The intense increase in the installed capacity of wind farms has required a computationally efficient dynamic equivalent model of wind *** types of wind-farm modelling aim to identify the accuracy and simulation time in the presence of the power *** this study,dynamic simulation of equivalent models of a sample wind farm,including single-turbine representation,multiple-turbine representation,quasi-multiple-turbine representation and full-turbine representation models,are performed using a doubly-fed induction generator wind turbine model developed in DIgSILENT *** developed doubly-fed induction generator model in DIgSILENT is intended to simulate inflow wind turbulence for more accurate *** wake effects between wind turbines for the fullturbine representation and multiple-turbine representation models have been considered using the Jensen *** developed model improves the extraction power of the turbine according to the layout of the wind *** accuracy of the mentioned methods is evaluated by calculating the output parameters of the wind farm,including active and reactive powers,voltage and instantaneous flicker *** study was carried out on a sample wind farm,which included 39 wind *** simulation results confirm that the computational loads of the single-turbine representation(STR),the multiple-turbine representation and the quasi-multiple-turbine representation are 1/39,1/8 and 1/8 times the full-turbine representation model,*** the other hand,the error of active power(voltage)with respect to the full-turbine representation model is 74.59%(1.31%),43.29%(0.31%)and 7.19%(0.11%)for the STR,the multiple-turbine representation and the quasi-multiple representation,respectively.
In the contemporary era of technological advancement,smartphones have become an indispensable part of individuals’daily lives,exerting a pervasive *** paper presents an innovative approach to passenger countingonbuse...
详细信息
In the contemporary era of technological advancement,smartphones have become an indispensable part of individuals’daily lives,exerting a pervasive *** paper presents an innovative approach to passenger countingonbuses throughthe analysis ofWi-Fi signals emanating frompassengers’mobile *** study seeks to scrutinize the reliability of digital Wi-Fi environments in predicting bus occupancy levels,thereby addressing a crucial aspect of public *** proposed system comprises three crucial elements:Signal capture,data filtration,and the calculation and estimation of passenger *** pivotal findings reveal that the system demonstrates commendable accuracy in estimating passenger counts undermoderate-crowding conditions,with an average deviation of 20%from the ground truth and an accuracy rate ranging from 90%to 100%.This underscores its efficacy in scenarios characterized by moderate levels of ***,in densely crowded conditions,the system exhibits a tendency to overestimate passenger numbers,occasionally doubling the actual *** acknowledging the need for further research to enhance accuracy in crowded conditions,this study presents a pioneering avenue to address a significant concern in public *** implications of the findings are poised to contribute substantially to the enhancement of bus operations and service quality.
The partial differential equation(PDE)solution of the telegrapher is a promising fault location method among time-domain and model-based *** research works have shown that the leap-frog process is superior to other ex...
详细信息
The partial differential equation(PDE)solution of the telegrapher is a promising fault location method among time-domain and model-based *** research works have shown that the leap-frog process is superior to other explicit methods for the PDE ***,its implementation is challenged by determining the initial conditions in time and the boundary conditions in *** letter proposes two implicit solution methods for determining the initial conditions and an analytical way to obtain the boundary conditions founded on the signal *** results show that the proposal gives fault location accuracy superior to the existing leap-frog scheme,particularly in the presence of harmonics.
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul...
详细信息
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network *** saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor *** of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to *** increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor *** Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster *** data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the ***,the MCH overhead *** the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods.
Securing low-power Internet-of-Things (IoT) sensor nodes is a critical challenge for the widespread adoption of IoT technology due to their limited energy, computation, and storage resources. As an alternative to the ...
详细信息
Cooperative communication through energy harvested relays in Cognitive Internet of Things(CIoT)has been envisioned as a promising solution to support massive connectivity of Cognitive Radio(CR)based IoT devices and to...
详细信息
Cooperative communication through energy harvested relays in Cognitive Internet of Things(CIoT)has been envisioned as a promising solution to support massive connectivity of Cognitive Radio(CR)based IoT devices and to achieve maximal energy and spectral efficiency in upcoming wireless *** this work,a cooperative CIoT system is contemplated,in which a source acts as a satellite,communicating with multiple CIoT devices over numerous *** Aerial Vehicles(UAVs)are used as relays,which are equipped with onboard Energy Harvesting(EH)*** adopted a Power Splitting(PS)method for EH at relays,which are harvested from the Radio frequency(RF)*** conjunction with this,the Decode and Forward(DF)relaying strategy is used at UAV relays to transmit the messages from the satellite source to the CIoT *** developed a Multi-Objective Optimization(MOO)framework for joint optimization of source power allocation,CIoT device selection,UAV relay assignment,and PS ratio *** formulated three objectives:maximizing the sum rate and the number of admitted CIoT in the network and minimizing the carbon dioxide *** MOO formulation is a Mixed-Integer Non-Linear Programming(MINLP)problem,which is challenging to *** address the joint optimization problem for an epsilon optimal solution,an Outer Approximation Algorithm(OAA)is proposed with reduced *** simulation results show that the proposed OAA is superior in terms of CIoT device selection and network utility maximization when compared to those obtained using the Nonlinear Optimization with Mesh Adaptive Direct-search(NOMAD)algorithm.
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
This work provides a basis for studying energy management optimisation in power-split hybrid electric vehicles (PSHEVs) to reduce fuel consumption and increase powertrain efficiency by enforcing a strategy related to ...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required i...
详细信息
As wafer circuit widths shrink less than 10 nm,stringent quality control is imposed on the wafer fabrication processes. Therefore, wafer residency time constraints and chamber cleaning operations are widely required in chemical vapor deposition, coating processes, etc. They increase scheduling complexity in cluster tools. In this paper, we focus on scheduling single-arm multi-cluster tools with chamber cleaning operations subject to wafer residency time constraints. When a chamber is being cleaned, it can be viewed as processing a virtual wafer. In this way, chamber cleaning operations can be performed while wafer residency time constraints for real wafers are not violated. Based on such a method, we present the necessary and sufficient conditions to analytically check whether a single-arm multi-cluster tool can be scheduled with a chamber cleaning operation and wafer residency time constraints. An algorithm is proposed to adjust the cycle time for a cleaning operation that lasts a long cleaning ***, algorithms for a feasible schedule are also *** an algorithm is presented for operating a multi-cluster tool back to a steady state after the cleaning. Illustrative examples are given to show the application and effectiveness of the proposed method.
Serverless computing has shifted cloud server management responsibilities away from end users and towards service providers. Serverless computing offers greater scalability, flexibility, ease of deployment, and cost-e...
详细信息
暂无评论