From variate bit-rate stereo matching, it is observed that the image pair with a low intensity quantization level is still capable of providing good disparity maps. In this article, a mathematical model representing t...
详细信息
This paper presents an allowable-tolerance-based group search optimization(AT-GSO),which combines the robust GSO(R-GSO)and the external quality design planning of the Taguchi ***-GSO algorithm is used to optimize the ...
详细信息
This paper presents an allowable-tolerance-based group search optimization(AT-GSO),which combines the robust GSO(R-GSO)and the external quality design planning of the Taguchi ***-GSO algorithm is used to optimize the heat transfer area of the heat exchanger *** R-GSO algorithm integrates the GSO algorithm with the Taguchi method,utilizing the Taguchi method to determine the optimal producer in each iteration of the GSO algorithm to strengthen the robustness of the search process and the ability to find the global *** conventional parameter design optimization,it is typically assumed that the designed parameters can be applied accurately and consistently throughout ***,for systems that are sensitive to changes in design parameters,even minor inaccuracies can substantially reduce overall system ***,the permissible variations of the design parameters are considered in the tolerance-optimized design to ensure the robustness of the *** optimized design of the heat exchanger system assumes that the system’s operating temperature parameters are ***,fixing the systemoperating temperature parameters at a constant value is *** paper assumes that the system operating temperature parameters have an uncertainty error when optimizing the heat transfer area of the heat exchanger *** results show that the AT-GSO algorithm optimizes the heat exchanger system and finds the optimal operating temperature in the absence of tolerance and under three tolerance conditions.
Now that the population is growing, the expenditure on basic needs of life is also increasing due to a lack of or less availability of resources. The economy consumed electricity is reaching peaks as its main fuel, co...
详细信息
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne...
详细信息
The Integrated Sensing and Communication (ISAC) system merged with Reconfigurable Intelligent Surface (RIS) has recently received much attention. This paper proposes an intelligent metaheuristic version of Enhanced Ar...
详细信息
The 5G New Radio (NR) network rollout calls for innovative methods to satisfy the growing demand for low latency, large data speeds, and consistent connectivity. Focussing on integrating several channels and signals, ...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
A three-phase three-wire LCL grid-connected inverter is usually used as an interface between renewable-energy sources and grid. However, grid voltage is always distorted and results in grid-current distortion when the...
详细信息
Erasable itemset mining is one of the most well-known methods in data mining for optimizing limited materials. After mining erasable itemsets, the manager can rearrange the production plan effectively. However, in rea...
详细信息
This article reviews the electromagnetic framework used to model radio frequency interference (RFI) and the resulting development of mitigation methods. With the rise of IoT devices, wireless devices in which RF anten...
详细信息
暂无评论