To alleviate the greenhouse effect and maintain the sustainable development, it is of great significance to find an efficient and low-cost catalyst to reduce carbon dioxide(CO_(2)) and generate formic acid(FA). In thi...
详细信息
To alleviate the greenhouse effect and maintain the sustainable development, it is of great significance to find an efficient and low-cost catalyst to reduce carbon dioxide(CO_(2)) and generate formic acid(FA). In this work, based on the first-principles calculation, the catalytic performance of a single transition metal(TM)(TM = Cr, Mn, Fe, Co, Ni, Cu, Zn,Ru, Rh, Pd, Ag, Cd, Ir, Pt, Au, or Hg) atom anchored on C_(9)N_(4) monolayer(TM@C_(9)N_(4)) for the hydrogenation of CO_(2) to FA is calculated. The results show that single TM atom doping in C_(9)N_(4) can form a stable TM@C_(9)N_(4) structure, and Cu@C_(9)N_(4) and Co@C_(9)N_(4) show better catalytic performance in the process of CO_(2) hydrogenation to FA(the corresponding maximum energy barriers are 0.41 eV and 0.43 e V, respectively). The partial density of states(PDOS), projected crystal orbital Hamilton population(p COHP), difference charge density analysis and Bader charge analysis demonstrate that the TM atom plays an important role in the reaction. The strong interaction between the 3d orbitals of the TM atom and the non-bonding orbitals(1πg) of CO_(2) allows the reaction to proceed under mild conditions. In general, our results show that Cu@C_(9)N_(4) and Co@C_(9)N_(4) are a promising single-atom catalyst and can be used as the non-precious metals electrocatalyst for CO_(2) hydrogenation to formic acid.
This paper focuses on vehicle detection at highway toll gates. The study involves the detection of vehicles within a custom dataset, which comprises four vehicle classes: car, truck, bus, and motorcycle. The YOLOv4 mo...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
The field of quantile estimation has grown in importance due to its myriad practical applications. Recent research trends have evolved from estimating the quantile for a single data stream to developing data structure...
Rapid developments in digital technology have expedited the dissemination of information on social media platforms like as Twitter, Facebook, and Weibo. Unverified information can create protests and mislead the publi...
详细信息
As cryptocurrencies become more popular as investment vehicles, bitcoin draws interest from businesses, consumers, and computer scientists all across the world. Bitcoin is a computer file stored in digital wallet appl...
详细信息
This research provides through method for building a recommendation system for health concerns for women the significant number of individuals' day-to-day activities are affected by menstruation symptoms including...
详细信息
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut...
详细信息
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all...
详细信息
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all optimization problems. A self-adapting and efficient dandelion algorithm is proposed in this work to lower the number of DA's parameters and simplify DA's structure. Only the normal sowing operator is retained;while the other operators are discarded. An adaptive seeding radius strategy is designed for the core dandelion. The results show that the proposed algorithm achieves better performance on the standard test functions with less time consumption than its competitive peers. In addition, the proposed algorithm is applied to feature selection for credit card fraud detection(CCFD), and the results indicate that it can obtain higher classification and detection performance than the-state-of-the-art methods.
Various methods have been proposed to secure access to sensitive information over time, such as many cryptographic methods in use to facilitate secure communications on the internet. But other methods like steganograp...
详细信息
暂无评论