Wireless power transfer (WPT) technology enables a cost-effective and sustainable energy supply in wireless networks. However, the broadcast nature of wireless signals makes them non-excludable public goods, which lea...
详细信息
A key factor for assessing the state of the heart after myocardial infarction (MI) is to measure whether the myocardium segment is viable after reperfusion or revascularization therapy. Delayed enhancement-MRI or DE-M...
详细信息
This article reformulates the multiple-input-multiple-output Volterra system identification problem as an extended Kalman filtering problem. This reformulation has two advantages. First, it results in a simplification...
详细信息
ISBN:
(数字)9781728113982
ISBN:
(纸本)9781728113999
This article reformulates the multiple-input-multiple-output Volterra system identification problem as an extended Kalman filtering problem. This reformulation has two advantages. First, it results in a simplification of the solution compared to the Tensor Network Kalman filter as no tensor filtering equations are required anymore. The second advantage is that the reformulation allows to model correlations between the parameters of different multiple-input-single-output Volterra systems, which can lead to better accuracy. The curse of dimensionality in the exponentially large parameter vector and covariance matrix is lifted through the use of low-rank tensor networks. The computational complexity of our tensor network implementation is compared to the conventional implementation and numerical experiments demonstrate the effectiveness of the proposed method.
This paper investigates the use of air-gap transformers in wireless energy transfer, particularly in electric vehicles. Air-gap transformers have very low coupling factor due to the length of the air-gap between the v...
详细信息
This paper presents a novel methodology that combines Hybrid Rectangular Input-Output Life Cycle Analysis and energy simulation methods to comprehensively evaluate the energy, economic, environmental, and social benef...
详细信息
This paper presents a novel methodology that combines Hybrid Rectangular Input-Output Life Cycle Analysis and energy simulation methods to comprehensively evaluate the energy, economic, environmental, and social benefits of Energy Efficiency (EE) solutions in residential buildings. Unlike conventional evaluations that focus primarily on operational energy savings, this approach examines 57,660 EE packages, encompassing envelope retrofitting and heating/cooling system upgrades, manufacturing, packaging, installation, maintenance, and operation life cycle phases. The analysis quantifies total energy and greenhouse gas savings, energy and greenhouse gas payback periods, job creation, gross value added, net present value, savings to investment ratio, impacts on family budget, and reduction in premature deaths. Findings demonstrate the superiority of this holistic approach, providing policymakers with enhanced insights for designing effective EE policies. The study also identifies region-specific optimal EE packages underlining the importance of integrating additional life cycle phases in the policy making process and emphasizing the importance of tailored regional strategies.
In this paper, we propose blind source separation (BSS) as pre-processing to unsupervised keyword spotting. We adopted our recently proposed keyword spotting and employed BSS framework to improve the detection rate in...
详细信息
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor ne...
详细信息
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes.
Using Maximum Likelihood (or Prediction Error) methods to identify linear state space model is a prime technique. The likelihood function is a nonconvex function and care must be exercised in the numerical maximizatio...
详细信息
A fundamental challenge in computer analysis of power flow is the rigorous understanding of the impact of different loading levels on the solutions of the power flow equation. This letter presents a comprehensive stud...
详细信息
暂无评论