By creating multipath backscatter links and amplify signal strength, reconfigurable intelligent surfaces (RIS) and decode-and-forward (DF) relaying are shown to degrade the latency of the ultrareliable low-latency com...
详细信息
Given the severity of waste pollution as a major environmental concern, intelligent and sustainable waste management is becoming increasingly crucial in both developed and developing countries. The material compositio...
详细信息
Wind power plants(WPPs)are increasingly mandated to provide temporary frequency support to power systems during contingencies involving significant power ***,the frequency support capabilities of WPPs under derated op...
详细信息
Wind power plants(WPPs)are increasingly mandated to provide temporary frequency support to power systems during contingencies involving significant power ***,the frequency support capabilities of WPPs under derated operations remain insufficiently investigated,highlighting the potential for further improvement of the frequency *** paper proposes a bi-level optimized temporary frequency support(OTFS)strategy for a *** implementation of the OTFS strategy is collaboratively accomplished by individual wind turbine(WT)controllers and the central WPP ***,to exploit the frequency support capability of WTs,the stable operational region of WTs is expanded by developing a novel dynamic power control approach in WT *** approach synergizes the WTs'temporary frequency support with the secondary frequency control of synchronous generators,enabling WTs to release more kinetic energy without causing a secondary frequency ***,a model predictive control strategy is developed for the WPP *** strategy ensures that multiple WTs operating within the expanded stable region are coordinated to minimize the magnitude of the frequency drop through efficient kinetic energy ***,comprehensive case studies are conducted on a real-time simulation platform to validate the effectiveness of the proposed strategy.
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristic...
详细信息
Intrusion detection is critical to guaranteeing the safety of the data in the *** though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion *** challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,*** to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection *** data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as ***,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack *** on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the ***,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced *** selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter ***,the selected features are trained and tested for detecting attacks using *** Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the
In the paper, an intelligent actor-critic learning control method augmented by a fuzzy broad learning system with output recurrent feedback (abbreviated as ORFBLS) is proposed for obstacle-avoiding trajectory tracking...
详细信息
Plastic waste in Polyethylene Terephthalate (PET) bottles is creating new challenges, which in today’s scenario is a major concern in every industry. The defect in PET bottles mainly occurs due to improper selection ...
详细信息
Plastic waste in Polyethylene Terephthalate (PET) bottles is creating new challenges, which in today’s scenario is a major concern in every industry. The defect in PET bottles mainly occurs due to improper selection of levels of process parameters during the production process. Therefore, optimizations of process parameters are very important to minimize the defects produced due to improper stretch blow molding process parameter selections. The study is carried out on 2 L bottle since they have the highest demand and the highest defect rate in the PET bottling sector. The PET bottles have been developed from the preform at various blowing temperature, blowing speed and blowing angle on commercially available SBM setup. The design and plan of experiments have been done according to L9 orthogonal array of Taguchi method. The optimization of process parameters has been done through the hybrid Taguchi grey relational analysis optimization technique on four factors namely: blowing temperature, first blow angle, second blow angle and blowing speed. Each value of parameter was taken at three levels in combination. The testing of all samples such as tensile test, wall thickness measurement and hoop stretch ratio measurement have been carried out as per ASTM standards. The morphology of the samples has been carried out through scanning electron microscope. A maximum tensile strength of 65 MPa, minimum hoop stretch ratio of 5.45 and a maximum wall thickness 0.24 mm was found at varying process parameter combinations. It has been observed that among the process parameters: blowing temperature was the most significant factor for minimizing defects while second blow angle was the least significant parameter. It was found that optimized values of the process parameters yielded 15% reduction in defects on PET bottles. The present study is expected to contribute significantly for the industries working in this field for carrying out production at optimum levels of process parameter
Uncertainty quantification approaches have been more critical in large language models (LLMs), particularly high-risk applications requiring reliable outputs. However, traditional methods for uncertainty quantificatio...
详细信息
Integrated sensing and communications (ISAC) is one of the crucial technologies for 6G, and channel state information (CSI) based sensing serves as an essential part of ISAC. However, current research on ISAC focuses ...
详细信息
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwr...
详细信息
Coping with noise in computing is an important problem to consider in large systems. With applications in fault tolerance (Hastad et al., 1987;Pease et al., 1980;Pippenger et al., 1991), noisy sorting (Shah and Wainwright, 2018;Agarwal et al., 2017;Falahatgar et al., 2017;Heckel et al., 2019;Wang et al., 2024a;Gu and Xu, 2023;Kunisky et al., 2024), noisy searching (Berlekamp, 1964;Horstein, 1963;Burnashev and Zigangirov, 1974;Pelc, 1989;Karp and Kleinberg, 2007), among many others, the goal is to devise algorithms with the minimum number of queries that are robust enough to detect and correct the errors that can happen during the computation. In this work, we consider the noisy computing of the threshold-k function. For n Boolean variables x = (x1, ..., xn) ∈ {0, 1}n, the threshold-k function THk(·) computes whether the number of 1's in x is at least k or not, i.e., (Equation presented) The noisy queries correspond to noisy readings of the bits, where at each time step, the agent queries one of the bits, and with probability p, the wrong value of the bit is returned. It is assumed that the constant p ∈ (0, 1/2) is known to the agent. Our goal is to characterize the optimal query complexity for computing the THk function with error probability at most δ. This model for noisy computation of the THk function has been studied by Feige et al. (1994), where the order of the optimal query complexity is established;however, the exact tight characterization of the optimal number of queries is still open. In this paper, our main contribution is tightening this gap by providing new upper and lower bounds for the computation of the THk function, which simultaneously improve the existing upper and lower bounds. The main result of this paper can be stated as follows: for any 1 ≤ k ≤ n, there exists an algorithm that computes the THk function with an error probability at most δ = o(1), and the algorithm uses at most (Equation presented) queries in expectation. Here we define m (Eq
Solid additive engineering has been intensively explored on morphology tuning for highly efficient all-polymer solar cells(all-PSCs), a promising photovoltaic technology towards multi-scenario *** the nano-fibrillar...
详细信息
Solid additive engineering has been intensively explored on morphology tuning for highly efficient all-polymer solar cells(all-PSCs), a promising photovoltaic technology towards multi-scenario *** the nano-fibrillar network of the active layer induced by additive treatment is confirmed as the key factor for power conversion efficiency(PCE) of all-PSCs, its formation mechanism is not clearly revealed,for lack of precise and convincing real-time observation of crystallization and phase separation during the liquid-to-solid transition process of spin-coating. Herein we report an in-situ grazing incidence wide-angle/small-angle X-ray scattering(GIWAXS/GISAXS) screening that reveals the fact that naphthalene derived solid additives can suppress the aggregation of the polymer acceptor(PY-IT) at the beginning stage of spin coating, which provides sufficient time and space for the polymer donor(PM6) to form the fibril structure. Moreover, guided by this knowledge, a ternary all-polymer system is proposed,which achieves cutting-edge level PCEs for both small-area(0.04 cm2)(also decent operational stability)and large-area(1 cm2) devices.
暂无评论