Hyperconcentrated turbidity currents typically display non-Newtonian characteristics that influence sediment transport and morphological evolution in alluvial ***,hydro-sedimentmorphological processes involving hyperc...
详细信息
Hyperconcentrated turbidity currents typically display non-Newtonian characteristics that influence sediment transport and morphological evolution in alluvial ***,hydro-sedimentmorphological processes involving hyperconcentrated turbidity currents are poorly understood,with little known about the effect of the non-Newtonian *** current paper extends a recent twodimensional double layer-averaged model to incorporate non-Newtonian constitutive *** extended model is benchmarked against experimental and numerical data for cases including subaerial mud flow,subaqueous debris flow,and reservoir turbidity *** computational results agree well with observations for the subaerial mud flow and independent numerical simulations of subaqueous debris *** between the non-Newtonian and Newtonian model results become more pronounced in terms of propagation distance and sediment transport rate as sediment concentration *** model is then applied to turbidity currents in the Guxian Reservoir planned for middle Yellow River,China,which connects to a tributary featuring hyperconcentrated sediment-laden *** non-Newtonian model predicts slower propagation of turbidity currents and more significant bed aggradation at the confluence between the tributary Wuding River and the Yellow River in the reservoir than its Newtonian *** difference in model performance could be of considerable importance when optimizing reservoir operation schemes.
Onemust interact with a specific webpage or website in order to use the Internet for communication,teamwork,and other productive ***,because phishing websites look benign and not all website visitors have the same kno...
详细信息
Onemust interact with a specific webpage or website in order to use the Internet for communication,teamwork,and other productive ***,because phishing websites look benign and not all website visitors have the same knowledge and skills to inspect the trustworthiness of visited websites,they are tricked into disclosing sensitive information and making them vulnerable to malicious software attacks like *** is impossible to stop attackers fromcreating phishingwebsites,which is one of the core challenges in combating ***,this threat can be alleviated by detecting a specific website as phishing and alerting online users to take the necessary precautions before handing over sensitive *** this study,five machine learning(ML)and DL algorithms—cat-boost(CATB),gradient boost(GB),random forest(RF),multilayer perceptron(MLP),and deep neural network(DNN)—were tested with three different reputable datasets and two useful feature selection techniques,to assess the scalability and consistency of each classifier’s performance on varied dataset *** experimental findings reveal that the CATB classifier achieved the best accuracy across all datasets(DS-1,DS-2,and DS-3)with respective values of 97.9%,95.73%,and 98.83%.The GB classifier achieved the second-best accuracy across all datasets(DS-1,DS-2,and DS-3)with respective values of 97.16%,95.18%,and 98.58%.MLP achieved the best computational time across all datasets(DS-1,DS-2,and DS-3)with respective values of 2,7,and 3 seconds despite scoring the lowest accuracy across all datasets.
In this paper, two finite transmission lines loaded with open-ended stubs distributed in different ways are compared and studied. The first structure is a periodically loaded transmission line with open-ended stubs. F...
详细信息
The rapid expansion of Internet of Things (IoT) and Edge devices has introduced a variety of security challenges, particularly within resource-constrained computing environments. This paper aims to address these chall...
详细信息
This paper presents a simple and efficient approach for an antenna design and construction based on an I-shaped slot-loaded triple wideband microstrip monopole antenna with novel radio frequency (RF) power/energy harv...
详细信息
In this paper, a novel cooperative formation and path following control method for multiple underactuated unmanned surface vehicles (USVs) is proposed. First, a distributed path variable update law is constructed to a...
详细信息
This paper represents the results of the interlaboratory comparisons (ILC) conducted in the purpose to test proficiency of accredited laboratories (23) according to in-situ measurement methods described in ISO 16283-1...
详细信息
A brain tumor is an abnormal mass in the brain that can be benign or malignant depending on the nature of the constituent cells. The origin of the tumor may be from the brain tissue, or it may spread to the brain from...
详细信息
This paper proposes an automated solution for parking monitoring using geo-tagged UAV (Unmanned Aerial Vehicle) images. The parking monitoring system utilizes a UAV to patrol the parking lot. The UAV captures video fo...
详细信息
Traditional rule-based Intrusion Detection Systems (IDS) are commonly employed owing to their simple design and ability to detect known threats. Nevertheless, as dynamic network traffic and a new degree of threats exi...
详细信息
暂无评论