Photovoltaic cells play a crucial role in converting sunlight into electrical energy. However, defects can occur during the manufacturing process, negatively impacting these cells’ efficiency and overall performance....
详细信息
Augmented reality (AR) has been applied to various mobile applications. Modern AR algorithms include neural networks, such as convolutional neural networks (CNNs) and graph convolutional networks (GCNs). The high comp...
详细信息
Most of the reported works on fade duration analyses were mainly based on the International Telecommunication Union-Radio Sector (ITU-R) method, which may not be excellently accurate for link budget analysis of terres...
详细信息
Renewable energies like solar, wind, etc. have gained a lot of importance in the recent years as they are clean sources that can be brought to use to supply power to charging stations (CS). The growing demand for elec...
详细信息
One of the most critical challenges in optical fiber communication systems using non-orthogonal multiple access (NOMA) techniques is reducing the peak-to-average power ratio (PAPR). Optical NOMA often leads to high PA...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which is directly related to the detection reliability and *** this paper,a strategy is proposed to integrate three currently competitive WA's evaluation ***,a conventional evaluation method based on AEF statistical indicators is *** evaluation approaches include competing AEF-based predicted value intervals,and AEF classification based on fuzzy *** AEF attributes contribute to a more accurate AEF classification to different *** resulting dynamic weighting applied to these attributes improves the classification *** evaluation method is applied to evaluate the WA of a particular AEF,to obtain the corresponding evaluation *** integration in the proposed strategy takes the form of a score *** cumulative score levels correspond to different final WA *** imaging is performed to visualize thunderstorm activities using those AEFs already evaluated to exhibit thunderstorm *** results confirm that the proposed strategy effectively and reliably images thunderstorms,with a 100%accuracy of WA *** is the first study to design an integrated thunderstorm detection strategy from a new perspective of WA evaluation,which provides promising solutions for a more reliable and flexible thunderstorm detection.
Integrating energy systems with information systems in smart grids offers a promising avenue for combating electricity theft by leveraging real-time data insights. Suspicious activity indicative of theft can be identi...
详细信息
This study focuses on islanding protection for a microgrid operating at 11kV. The literature provides novel algorithms developed for islanding protection schemes. However, there is a lack of validation and test the IE...
详细信息
A general model is developed for forward-biased p-n junctions with arbitrary doping concentrations biased at any injection level. It goes beyond the commonly practiced depletion approximation, which is valid only unde...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteri...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteristics, offers unparalleled precision in individual identification. However, the integrity and confidentiality of biometric data remain paramount concerns, given its susceptibility to compromise. This research delineates the development and implementation of an innovative framework for cancellable biometrics, focusing on facial and fingerprint recognition. This study introduces a novel cancellable biometrics framework that integrates graph theory encryption with three-dimensional chaotic logistic mapping. The methodology encompasses a multifaceted approach: initially employing graph theory for the secure and efficient encryption of biometric data, subsequently enhanced by the complexity and unpredictability of three-dimensional chaotic logistic mapping. This dual-layered strategy ensures the robustness of the encryption, thereby significantly elevating the security of biometric data against unauthorized access and potential compromise. Thus, the resulting cancellable biometrics, characterized by the ability to transform biometric data into an adjustable representation, addresses critical challenges in biometric security. It allows for the revocation and reissuance of biometric credentials, thereby safeguarding the original biometric characteristics of individuals. This feature not only enhances user privacy and data security but also introduces a dynamic aspect to biometric authentication, facilitating adaptability across diverse systems and applications. Preliminary evaluations of the proposed framework demonstrate a marked improvement in the security of face and fingerprint recognition systems. Through the application of graph theory encryption, coupled with three-dimensional chaotic logistic mapping, our framework mitigates the risks associated with t
暂无评论