This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity fa...This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.展开更多
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.展开更多
The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the di...The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.展开更多
The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines ...The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.展开更多
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.展开更多
The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this stud...The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.展开更多
Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for manag...Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for managing the supply chain of these commodities. This study aimed to evaluate the effectiveness of LMIS in ensuring the availability of essential medicines and medical supplies in public hospitals in the Copperbelt Province of Zambia. Materials and Methods: From February to April 2022, a cross-sectional study was conducted in 12 public hospitals across the Copperbelt Province. Data were collected using structured questionnaires, checklists, and stock control cards. The study assessed LMIS availability, training, and knowledge among pharmacy personnel, as well as data accuracy, product availability, and order fill rates. Descriptive statistics were used to analyse the data. Results: All surveyed hospitals had LMIS implemented and were using eLMIS as the primary LMIS. Only 47% and 48% of pharmacy personnel received training in eLMIS and Essential Medicines Logistics Improvement Program (EMLIP), respectively. Most personnel demonstrated good knowledge of LMIS, with 77.7% able to log in to eLMIS Facility Edition, 76.6% able to locate stock control cards in the system, and 78.7% able to perform transactions. However, data accuracy from physical and electronic records varied from 0% to 60%, and product availability ranged from 50% to 80%. Order fill rates from Zambia Medicines and Medical Supplies Agency (ZAMMSA) were consistently below 30%. Discrepancies were observed between physical stock counts and eLMIS records. Conclusion: This study found that most hospitals in the Copperbelt Province of Zambia have implemented LMIS use. While LMIS implementation is high in the Copperbelt Province of Zambia, challenges such as low training levels, data inaccuracies, low product availability, and order fill rates persist. Addressing these issues requires a comprehensive approach, including capacity building, data quality improvement, supply chain coordination, and investment in infrastructure and human resources. Strengthening LMIS effectiveness is crucial for improving healthcare delivery and patient outcomes in Zambia.展开更多
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl...Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.展开更多
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ...The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.展开更多
This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal syste...This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal systems have the heat, permeability and fluid, requiring only drilling down to °C, normal heat flow or decaying radiogenic granite as heat sources, and used in district heating. Medium-temperature (MT) 100°C - 190°C, and high-temperature (HT) 190°C - 374°C resources are mostly at plate boundaries, with volcanic intrusive heat source, used mostly for electricity generation. Single well capacities are °C - 500°C) and a range of depths (1 m to 20 Km), but lack permeability or fluid, thus requiring stimulations for heat extraction by conduction. HVAC is 1 - 2 m deep and shallow geothermal down to 500 m in wells, both capturing °C, with °C are either advanced by geothermal developers at <7 Km depth (Enhanced Geothermal Systems (EGS), drilling below brittle-ductile transition zones and under geothermal fields), or by the Oil & Gas industry (Advanced Geothermal Systems, heat recovery from hydrocarbon wells or reservoirs, Superhot Rock Geothermal, and millimeter-wave drilling down to 20 Km). Their primary aim is electricity generation, relying on closed-loops, but EGS uses fractures for heat exchange with earthquake risks during fracking. Unconventional approaches could be everywhere, with shallow geothermal already functional. The deeper and hotter unconventional alternatives are still experimental, overcoming costs and technological challenges to become fully commercial. Meanwhile, the conventional geothermal resources remain the most proven opportunities for investments and development.展开更多
文摘This paper introduces an optimized planning approach for integrating photovoltaic as distributed generation (PV-DG) into the radial distribution power systems, utilizing exhaustive load flow (ELF), loss sensitivity factor (LSF), genetic algorithms (GA) methods, and numerical method based on LSF. The methodology aims to determine the optimal allocation and sizing of multiple PV-DG to minimize power loss through time series power flow analysis. An approach utilizing continuous sensitivity analysis is developed and inherently leverages power flow and loss equations to compute LSF of all buses in the system towards employing a dynamic PV-DG model for more accurate results. The algorithm uses a numerical grid search method to optimize PV-DG placement in a power distribution system, focusing on minimizing system losses. It combines iterative analysis, sensitivity assessment, and comprehensive visualization to identify and present the optimal PV-DG configurations. The present-ed algorithms are verified through co-simulation framework combining MATLAB and OpenDSS to carry out analysis for 12-bus radial distribution test system. The proposed numerical method is compared with other algorithms, such as ELF, LSF methods, and Genetic Algorithms (GA). Results show that the proposed numerical method performs well in comparison with LSF and ELF solutions.
文摘It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.
文摘The rapid advancement of information technology has promoted the development of informatization in universities. The freshmen welcome information system of universities is the first important system to showcase the digital level of the university to new students. With the expansion of the enrollment scale of universities, improving the efficiency of welcoming work has become an urgent problem to be solved. This article analyzes the characteristics and existing problems of the welcoming work, combined with the main technical methods of information system construction, and based on the comprehensive situation of information systems in our university, proposes the construction goals and ideas of the welcoming information system, summarizes the construction process and operation results of the welcome system, and explores possible directions for future optimization.
文摘The integration of artificial intelligence into the development and production of mechatronic products offers a substantial opportunity to enhance efficiency, adaptability, and system performance. This paper examines the utilization of reinforcement learning as a control strategy, with a particular focus on its deployment in pivotal stages of the product development lifecycle, specifically between system architecture and system integration and verification. A controller based on reinforcement learning was developed and evaluated in comparison to traditional proportional-integral controllers in dynamic and fault-prone environments. The results illustrate the superior adaptability, stability, and optimization potential of the reinforcement learning approach, particularly in addressing dynamic disturbances and ensuring robust performance. The study illustrates how reinforcement learning can facilitate the transition from conceptual design to implementation by automating optimization processes, enabling interface automation, and enhancing system-level testing. Based on the aforementioned findings, this paper presents future directions for research, which include the integration of domain-specific knowledge into the reinforcement learning process and the validation of this process in real-world environments. The results underscore the potential of artificial intelligence-driven methodologies to revolutionize the design and deployment of intelligent mechatronic systems.
文摘Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.
文摘The study was carried out in the Tahoua region at the market gardening sites of the Taddis 1 and 2 valley. Small-scale pumping irrigation is one of the most interesting uses of solar energy. The objective of this study is to carry out a comparative analysis of two dewatering pumping systems (Solar Kit and GMP) for water mobilization on a certain number of criteria such as sustainable use, economic aspect and performance. To achieve this, the adapted methodology consisted first of all in the development of a data collection tool in the field. Then flow measurements, estimation of fuel consumption, pressure height, etc., were carried out. Thus, the data collection involved a sample of 120 irrigators who had to use the two (2) types of pumping systems. The collected data were analyzed and processed with appropriate software. The results of the study show that the two pumping systems studied have strengths and constraints. Thus, the solar pumping system has a significant investment cost, very low maintenance and a low operating cost. On the other hand, the system with a generator has a relatively low investment cost (25 to 30 times less than solar), but a relatively high operating, upkeep and maintenance cost. He adds that these assets and constraints must be taken into consideration when an investment is made. This study shows that 74% of producers use GMP compared to 26% who use the Solar Kit. But in practice, the Solar Kit is more reliable for producers from the point of view of planted area, environmental management and investment costs, supply of fuel and lubricant. These results indicate better performance of the solar pumping system compared to GMP at the study sites.
文摘Background: The availability of essential medicines and medical supplies is crucial for effectively delivering healthcare services. In Zambia, the Logistics Management Information System (LMIS) is a key tool for managing the supply chain of these commodities. This study aimed to evaluate the effectiveness of LMIS in ensuring the availability of essential medicines and medical supplies in public hospitals in the Copperbelt Province of Zambia. Materials and Methods: From February to April 2022, a cross-sectional study was conducted in 12 public hospitals across the Copperbelt Province. Data were collected using structured questionnaires, checklists, and stock control cards. The study assessed LMIS availability, training, and knowledge among pharmacy personnel, as well as data accuracy, product availability, and order fill rates. Descriptive statistics were used to analyse the data. Results: All surveyed hospitals had LMIS implemented and were using eLMIS as the primary LMIS. Only 47% and 48% of pharmacy personnel received training in eLMIS and Essential Medicines Logistics Improvement Program (EMLIP), respectively. Most personnel demonstrated good knowledge of LMIS, with 77.7% able to log in to eLMIS Facility Edition, 76.6% able to locate stock control cards in the system, and 78.7% able to perform transactions. However, data accuracy from physical and electronic records varied from 0% to 60%, and product availability ranged from 50% to 80%. Order fill rates from Zambia Medicines and Medical Supplies Agency (ZAMMSA) were consistently below 30%. Discrepancies were observed between physical stock counts and eLMIS records. Conclusion: This study found that most hospitals in the Copperbelt Province of Zambia have implemented LMIS use. While LMIS implementation is high in the Copperbelt Province of Zambia, challenges such as low training levels, data inaccuracies, low product availability, and order fill rates persist. Addressing these issues requires a comprehensive approach, including capacity building, data quality improvement, supply chain coordination, and investment in infrastructure and human resources. Strengthening LMIS effectiveness is crucial for improving healthcare delivery and patient outcomes in Zambia.
文摘Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.
文摘The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS.
文摘This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal systems have the heat, permeability and fluid, requiring only drilling down to °C, normal heat flow or decaying radiogenic granite as heat sources, and used in district heating. Medium-temperature (MT) 100°C - 190°C, and high-temperature (HT) 190°C - 374°C resources are mostly at plate boundaries, with volcanic intrusive heat source, used mostly for electricity generation. Single well capacities are °C - 500°C) and a range of depths (1 m to 20 Km), but lack permeability or fluid, thus requiring stimulations for heat extraction by conduction. HVAC is 1 - 2 m deep and shallow geothermal down to 500 m in wells, both capturing °C, with °C are either advanced by geothermal developers at <7 Km depth (Enhanced Geothermal Systems (EGS), drilling below brittle-ductile transition zones and under geothermal fields), or by the Oil & Gas industry (Advanced Geothermal Systems, heat recovery from hydrocarbon wells or reservoirs, Superhot Rock Geothermal, and millimeter-wave drilling down to 20 Km). Their primary aim is electricity generation, relying on closed-loops, but EGS uses fractures for heat exchange with earthquake risks during fracking. Unconventional approaches could be everywhere, with shallow geothermal already functional. The deeper and hotter unconventional alternatives are still experimental, overcoming costs and technological challenges to become fully commercial. Meanwhile, the conventional geothermal resources remain the most proven opportunities for investments and development.