Titanium dioxide(TiO_(2))is an extremely promising anode material for lithium-ion batteries due to its low cost,minimal volume change,and extended cycle life.However,its electrochemical performance is severely hindere...Titanium dioxide(TiO_(2))is an extremely promising anode material for lithium-ion batteries due to its low cost,minimal volume change,and extended cycle life.However,its electrochemical performance is severely hindered by inherent issues such as poor ionic and electronic conductivity.Here,we design a dual-phase conductor Co@TiO_(2),which contributes a synergistic storage mode consisting of a Li-accepting and an electron-accepting phase.In situ magnetic characterization and experimental results reveal the space charge storage mechanism in addition to traditional insertion mechanisms.Based on these mechanisms,the specific capacity and rate performance of the Co@TiO_(2)electrode have been greatly enhanced.Under a current density of 200 mA·g^(-1),the specific capacity of Co@TiO_(2)reaches 397.2 mAh·g^(-1).Upon increasing the current density to 10 A·g^(-1),the electrode still maintains a capacity of 83.1 mAh·g^(-1)after 900 cycles.This result offers a fresh perspective on the structural design of new anode materials to achieve high energy density.展开更多
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor ne...This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes.展开更多
This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics t...This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end.展开更多
Text similarity has a relatively wide range of applications in many fields, such as intelligent information retrieval, question answering system, text rechecking, machine translation, and so on. The text similarity co...Text similarity has a relatively wide range of applications in many fields, such as intelligent information retrieval, question answering system, text rechecking, machine translation, and so on. The text similarity computing based on the meaning has been used more widely in the similarity computing of the words and phrase. Using the knowledge structure of the and its method of knowledge description, taking into account the other factor and weight that influenced similarity, making full use of depth and density of the Concept-Sememe tree, an improved method of Chinese word similarity calculation based on semantic distance was provided in this paper. Finally the effectiveness of this method was verified by the simulation results.展开更多
The recently proposed data-driven pole placement method is able to make use of measurement data to simultaneously identify a state space model and derive pole placement state feedback gain. It can achieve this precise...The recently proposed data-driven pole placement method is able to make use of measurement data to simultaneously identify a state space model and derive pole placement state feedback gain. It can achieve this precisely for systems that are linear time-invariant and for which noiseless measurement datasets are available. However, for nonlinear systems, and/or when the only noisy measurement datasets available contain noise, this approach is unable to yield satisfactory results. In this study, we investigated the effect on data-driven pole placement performance of introducing a prefilter to reduce the noise present in datasets. Using numerical simulations of a self-balancing robot, we demonstrated the important role that prefiltering can play in reducing the interference caused by noise.展开更多
Development of bilingual curricula of computer science in HYIT has been introduced.The key success factors of bilingual education were proposed and improvement of the abilities of bilingual teachers,textbook construct...Development of bilingual curricula of computer science in HYIT has been introduced.The key success factors of bilingual education were proposed and improvement of the abilities of bilingual teachers,textbook construction and evaluation of bilingual education are discussed in detail.展开更多
Two novel ultrasound imaging techniques with imaging contrast mechanisms are in the works:X-ray-induced acoustic computed tomography(XACT),and nanoscale photoacoustic tomogra-phy(nPAT).XACT has incredible potential in...Two novel ultrasound imaging techniques with imaging contrast mechanisms are in the works:X-ray-induced acoustic computed tomography(XACT),and nanoscale photoacoustic tomogra-phy(nPAT).XACT has incredible potential in:(1)biomedical imaging,through which a 3D image can be generated using only a single X-ray projection,and(2)radiation dosimetry.nPATas a new alternative of super-resolution microscopy can break through the optical difraction limitand is capable of exploring sub-celular structures without reliance on fuorescence labeling.We expect these new imaging techniques to find widespread applications in both pre-clinical andclinical biomedical research.展开更多
Thailand has been on the World Health Organization(WHO)’s notorious deadliest road list for several years,currently ranking eighth on the list.Among all types of road fatalities,pickup trucks converted into vehicles ...Thailand has been on the World Health Organization(WHO)’s notorious deadliest road list for several years,currently ranking eighth on the list.Among all types of road fatalities,pickup trucks converted into vehicles for public transportation are found to be the most problematic due to their high occupancy and minimal passenger safety measures,such as safety belts.Passenger overloading is illegal,but it is often overlooked.The country often uses police checkpoints to enforce traffic laws.However,there are few or no highway patrols to apprehend offending drivers.Therefore,in this study,we propose the use of existing closed-circuit television(CCTV)traffic cameras with deep learning techniques to classify overloaded public transport pickup trucks(PTPT)to help reduce accidents.As the said type of vehicle and its passenger occupancy characteristics are unique,a new model is deemed necessary.The contributions of this study are as follows:First,we used various state-of-the-art object detection YOLOv5(You Only Look Once)models to obtain the optimum overcrowded model pretrained on our manually labeled dataset.Second,we made our custom dataset available.Upon investigation,we compared all the latestYOLOv5 models and discovered that theYOLOv5L yielded the optimal performance with a mean average precision(mAP)of 95.1%and an inference time of 33 frames per second(FPS)on a graphic processing unit(GPU).We aim to deploy the selected model on traffic control computers to alert the police of such passenger-overloading violations.The use of a chosen algorithm is feasible and is expected to help reduce trafficrelated fatalities.展开更多
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM ope...Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital algorithm.Then, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. Computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.展开更多
Face detection is applied to many tasks such as auto focus control, surveillance, user interface, and face recognition. Processing speed and detection accuracy of the face detection have been improved continuously. Th...Face detection is applied to many tasks such as auto focus control, surveillance, user interface, and face recognition. Processing speed and detection accuracy of the face detection have been improved continuously. This paper describes a novel method of fast face detection with multi-scale window search free from image resizing. We adopt statistics of gradient images (SGI) as image features and append an overlapping cell array to improve detection accuracy. The SGI feature is scale invariant and insensitive to small difference of pixel value. These characteristics enable the multi-scale window search without image resizing. Experimental results show that processing speed of our method is 3.66 times faster than a conventional method, adopting HOG features combined to an SVM classifier, without accuracy degradation.展开更多
Frameworks are developed to capture the recurring design practices in terms of skeletons of software subsystems/ systems. They are designed ‘abstract’ and ‘incomplete’ and are designed with predefined points of va...Frameworks are developed to capture the recurring design practices in terms of skeletons of software subsystems/ systems. They are designed ‘abstract’ and ‘incomplete’ and are designed with predefined points of variability, known as hot spots, to be customized later at the time of framework reuse. Frameworks are reusable entities thus demand stricter and rigorous testing in comparison to one-time use application. It would be advisable to guaranty the production of high quality frameworks without incurring heavy costs for their rigorous testing. The overall cost of framework development may be reduced by designing frameworks with high testability. This paper aims at discussing various metric models for testability analysis of frameworks in an attempt to having quantitative data on testability to be used to plan and monitor framework testing activities so that the framework testing effort and hence the overall framework development effort may be brought down. The models considered herein particularly consider that frameworks are inherently abstract and variable in nature.展开更多
Quality assurance is of vital importance to bilingual education.Effective promotive measures adopted in interactive bilingual teaching including key point interaction between students and teacher in class,case teachin...Quality assurance is of vital importance to bilingual education.Effective promotive measures adopted in interactive bilingual teaching including key point interaction between students and teacher in class,case teaching,stereoscopic teaching were described in detail.The assessment of bilingual education quality via weight distribution of success factors of bilingual education was proposed practically.展开更多
Advancing technology has enabled the production of smaller, more energy efficient and cheaper electronic components. Therefore, previously existing many computer and electronics science-engineering ideas have become f...Advancing technology has enabled the production of smaller, more energy efficient and cheaper electronic components. Therefore, previously existing many computer and electronics science-engineering ideas have become feasible. One of them is the technology of wireless sensor networks (WSNs), which has become the realization of the necessary technical requirements applicable today with low energy consumption. First, the sensing tasks and the potential sensor networks applications have explored, and reviews of factors influencing the design of sensor networks have provided. Then, the communication architectures for sensor networks have been outlined. PIC-based microcontrollers have used in the design of the sensor nodes. The design of the sensor node has supported with ultra-low power nanowatt technology for very low-cost design. Processing, memory and wireless communication units have integrated on to the sensor nodes and sensors to be used in the designed system which have allowed to be connected to any kind of sensor node. The designed sensor node’s operating system has written with the PIC C language, and PIC operating system has allowed different features such as measuring humidity, temperature, light sensitive and smoke sensor. Computer software has developed for data that can be recorded and monitored from a central location. Decision-making unit has created in the software algorithm and hardware modules for the implementation of decisions taken by the developed sensor nodes. Developed PIC-based sensor nodes have supported a unique voltage unit with renewable energy sources such as solar panel, rechargeable battery, and supercapacitor for energy production and saving. The results of this study are expected to be helpful for the development of WSN especially with renewable energy sources.展开更多
This paper contributes to the well-known challenge of active user participation in demand side management(DSM).In DSM, there is a need for modern pricing mechanisms that will be able to effectively incentivize selfish...This paper contributes to the well-known challenge of active user participation in demand side management(DSM).In DSM, there is a need for modern pricing mechanisms that will be able to effectively incentivize selfishly behaving users in modifying their energy consumption pattern towards system-level goals like energy efficiency.Three generally desired properties of DSM algorithms are: user satisfaction, energy cost minimization and fairness.In this paper, a personalized real-time pricing(P-RTP) mechanism design framework is proposed that fairly allocates the energy cost reduction only to the users that provoke it.Thus, the proposed mechanism achieves significant reduction of the energy cost without sacrificing at all the welfare(user satisfaction)of electricity consumers.The business model that the proposed mechanism envisages is highly competitive flexibility market environments as well as energy cooperatives.展开更多
Liberalized electricity markets,smart grids and high penetration of renewable energy sources(RESs)led to the development of novel markets,whose objective is the harmonization between production and demand,usually note...Liberalized electricity markets,smart grids and high penetration of renewable energy sources(RESs)led to the development of novel markets,whose objective is the harmonization between production and demand,usually noted as real time of flexibility markets.This necessitates the development of novel pricing schemes able to allow energy service providers(ESPs)to maximize their aggregated profits from the traditional markets(trading between wholesale/day-ahead and retail markets)and the innovative flexibility markets.In the same time,ESPs have to offer their end users(consumers)competitive(low cost)energy services.In this context,novel pricing schemes must act,among others,as automated demand side management(DSM)techniques that are able to trigger the desired behavioral changes according to the flexibility market prices in energy consumption curves(ECCs)of the consumers.Energy pricing schemes proposed so far,e.g.realtime pricing,interact in an efficient way with wholesale market.But they do not provide consumers with strong enough financial incentives to modify their energy consumption habits towards energy cost curtailment.Thus,they do not interact efficiently with flexibility markets.Therefore,we develop a flexibility real-time pricing(FRTP)scheme,which offers a dynamically adjustable level of financial incentives to participating users by fairly rewarding the ones that make desirable behavioral changes in their ECCs.Performance evaluation results demonstrate that the proposed FRTP is able to offer a 15%–30%more attractive trade-off between the stacked profits of ESPs,i.e.the sum of the profits from retail and flexibility markets,and the satisfaction of consumers.展开更多
Nowadays,virtual machine migration(VMM)is a trending research since it helps in balancing the load of the Cloud effectively.Several VMM-based strategies defined in the literature have considered various metrics,such a...Nowadays,virtual machine migration(VMM)is a trending research since it helps in balancing the load of the Cloud effectively.Several VMM-based strategies defined in the literature have considered various metrics,such as load,energy,and migration cost for balancing the load of the model.This paper introduces a novel VMM strategy by considering the load of the Cloud network.Two important aspects of the proposed scheme are the load prediction through the support vector regression(SVR)and the optimal VM placement through the proposed dragonfly-based crow(D-Crow)optimization algorithm.The proposed D-Crow optimization algorithm is developed by incorporating crow search algorithm(CSA)into dragonfly algorithm(DA).Also,the proposed VMM strategy defines a load balancing model based on the energy consumption,load,and the migration cost to achieve the energy-aware VMM.The simulation of the proposed VMM strategy is done based on the metrics such as load,energy consumption,and the migration cost.From the results,it can be shown that the proposed VMM strategy surpassed other comparative models by achieving the minimum values of 7.3719%,10.0368%,and 11.0639%for the load,energy consumption,and migration cost,respectively.展开更多
In this paper,we study two fractional models in the Caputo–Fabrizio sense and Atangana–Baleanu sense,in which the effects of malaria infection on mosquito biting behavior and attractiveness of humans are considered....In this paper,we study two fractional models in the Caputo–Fabrizio sense and Atangana–Baleanu sense,in which the effects of malaria infection on mosquito biting behavior and attractiveness of humans are considered.Using Lyapunov theory,we prove the global asymptotic stability of the unique endemic equilibrium of the integer-order model,and the fractional models,whenever the basic reproduction number R0 is greater than one.By using fixed point theory,we prove existence,and conditions of the uniqueness of solutions,as well as the stability and convergence of numerical schemes.Numerical simulations for both models,using fractional Euler method and Adams–Bashforth method,respectively,are provided to confirm the effectiveness of used approximation methods for different values of the fractional-orderγ.展开更多
In this work,we use a Predictor–Corrector method to implement and derive an iterative solution of an existing Tuberculosis(TB)model with two fractional derivatives,namely,Caputo–Fabrizio fractional derivative and th...In this work,we use a Predictor–Corrector method to implement and derive an iterative solution of an existing Tuberculosis(TB)model with two fractional derivatives,namely,Caputo–Fabrizio fractional derivative and the new generalized Caputo fractional derivative.We begin by recalling some existing results such as the basic reproduction number R0 and the equilibrium points of the model.Then,we study the global asymptotic stability of disease-free equilibrium of the fractional models.We also prove,for each fractional model,the existence and uniqueness of solutions.An iterative solution of the two models is computed using the Predictor–Corrector method.Using realistic parameter values,we perform numerical simulations for different values of the fractional order.Simulation results permit to conclude that the new generalized Caputo fractional derivative provides a more realistic analysis than the Caputo–Fabrizio fractional derivative and the classical integer-order TB model.展开更多
基金financially supported by the National Natural Science Foundation of China(Nos.92372127 and 22179066)Natural Science Foundation of Shandong,China(Nos.ZR2023JQ017,202210060028,and ZR2021QE061)
文摘Titanium dioxide(TiO_(2))is an extremely promising anode material for lithium-ion batteries due to its low cost,minimal volume change,and extended cycle life.However,its electrochemical performance is severely hindered by inherent issues such as poor ionic and electronic conductivity.Here,we design a dual-phase conductor Co@TiO_(2),which contributes a synergistic storage mode consisting of a Li-accepting and an electron-accepting phase.In situ magnetic characterization and experimental results reveal the space charge storage mechanism in addition to traditional insertion mechanisms.Based on these mechanisms,the specific capacity and rate performance of the Co@TiO_(2)electrode have been greatly enhanced.Under a current density of 200 mA·g^(-1),the specific capacity of Co@TiO_(2)reaches 397.2 mAh·g^(-1).Upon increasing the current density to 10 A·g^(-1),the electrode still maintains a capacity of 83.1 mAh·g^(-1)after 900 cycles.This result offers a fresh perspective on the structural design of new anode materials to achieve high energy density.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant No.61373126the Natural Science Foundation of Jiangsu Province of China under Grant No.BK20131107the Fundamental Research Funds for the Central Universities under Grant No.JUSRP51510
文摘This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes.
文摘This paper provides a deep evaluation of the energy consumption of routing protocols. The evaluation is done along with other metrics such as throughput and packet delivery ratio (PDR). We introduce two more metrics to capture the efficiency of the energy consumption: e-throughput and e-PDR. Both are ratios in relation to the energy. We consider the three low layers of the stack. Three types of routing protocols are used: proactive, reactive, and hybrid. At the MAC and PHY layer, three radio types are considered: 802.11a/b/g. Finally, the number of nodes is varying in random topologies, with nodes being static or mobile. Simulations are conducted using NS3. The parameters of a real network interface card are used. From the results in mobile position scenarios, no protocol is outperforming the others;even if OLSR has the lowest energy consumption, most of the time. However, in constant position scenarios, AODV consumed a lower energy, apart from the scenarios using the 802.11a standard where HWMP energy consumption is the lowest. Regarding the energy efficiency, AODV protocols provided the best e-throughput and OLSR the best e-PDR in overall configurations. A framework for selecting energy-efficient routing protocol depending on network characteristics is proposed at the end.
文摘Text similarity has a relatively wide range of applications in many fields, such as intelligent information retrieval, question answering system, text rechecking, machine translation, and so on. The text similarity computing based on the meaning has been used more widely in the similarity computing of the words and phrase. Using the knowledge structure of the and its method of knowledge description, taking into account the other factor and weight that influenced similarity, making full use of depth and density of the Concept-Sememe tree, an improved method of Chinese word similarity calculation based on semantic distance was provided in this paper. Finally the effectiveness of this method was verified by the simulation results.
文摘The recently proposed data-driven pole placement method is able to make use of measurement data to simultaneously identify a state space model and derive pole placement state feedback gain. It can achieve this precisely for systems that are linear time-invariant and for which noiseless measurement datasets are available. However, for nonlinear systems, and/or when the only noisy measurement datasets available contain noise, this approach is unable to yield satisfactory results. In this study, we investigated the effect on data-driven pole placement performance of introducing a prefilter to reduce the noise present in datasets. Using numerical simulations of a self-balancing robot, we demonstrated the important role that prefiltering can play in reducing the interference caused by noise.
文摘Development of bilingual curricula of computer science in HYIT has been introduced.The key success factors of bilingual education were proposed and improvement of the abilities of bilingual teachers,textbook construction and evaluation of bilingual education are discussed in detail.
文摘Two novel ultrasound imaging techniques with imaging contrast mechanisms are in the works:X-ray-induced acoustic computed tomography(XACT),and nanoscale photoacoustic tomogra-phy(nPAT).XACT has incredible potential in:(1)biomedical imaging,through which a 3D image can be generated using only a single X-ray projection,and(2)radiation dosimetry.nPATas a new alternative of super-resolution microscopy can break through the optical difraction limitand is capable of exploring sub-celular structures without reliance on fuorescence labeling.We expect these new imaging techniques to find widespread applications in both pre-clinical andclinical biomedical research.
基金This work was supported by(i)Suranaree University of Technology,(ii)Thailand Science Research and Innovation,and(iii)National Science Research and Innovation Fund(Grant Number:RU-7-706-59-03).
文摘Thailand has been on the World Health Organization(WHO)’s notorious deadliest road list for several years,currently ranking eighth on the list.Among all types of road fatalities,pickup trucks converted into vehicles for public transportation are found to be the most problematic due to their high occupancy and minimal passenger safety measures,such as safety belts.Passenger overloading is illegal,but it is often overlooked.The country often uses police checkpoints to enforce traffic laws.However,there are few or no highway patrols to apprehend offending drivers.Therefore,in this study,we propose the use of existing closed-circuit television(CCTV)traffic cameras with deep learning techniques to classify overloaded public transport pickup trucks(PTPT)to help reduce accidents.As the said type of vehicle and its passenger occupancy characteristics are unique,a new model is deemed necessary.The contributions of this study are as follows:First,we used various state-of-the-art object detection YOLOv5(You Only Look Once)models to obtain the optimum overcrowded model pretrained on our manually labeled dataset.Second,we made our custom dataset available.Upon investigation,we compared all the latestYOLOv5 models and discovered that theYOLOv5L yielded the optimal performance with a mean average precision(mAP)of 95.1%and an inference time of 33 frames per second(FPS)on a graphic processing unit(GPU).We aim to deploy the selected model on traffic control computers to alert the police of such passenger-overloading violations.The use of a chosen algorithm is feasible and is expected to help reduce trafficrelated fatalities.
基金supported by National Natural Science Foundation of China (No. 61971149, 62071504, 62271208)in part by the Special Projects in Key Fields for General Universities of Guangdong Province (No. 2020ZDZX3025, 2021ZDZX056)+1 种基金in part by the Guangdong Basic and Applied Basic Research Foundation (No. 2021A1515011657)in part by the Featured Innovation Projects of Guangdong Province of China (No. 2021KTSCX049)。
文摘Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error performance.In CIM, at least two different IM operations construct a super IM operation or achieve new functionality. First, we propose a OFDM with generalized CIM(OFDM-GCIM) scheme to achieve a joint IM of subcarrier selection and multiple-mode(MM)permutations by using a multilevel digital algorithm.Then, two schemes, called double CIM(D-CIM) and multiple-layer CIM(M-CIM), are proposed for secure communication, which combine new IM operation for disrupting the original order of bits and symbols with conventional OFDM-IM, to protect the legitimate users from eavesdropping in the wireless communications. A subcarrier-wise maximum likelihood(ML) detector and a low complexity log-likelihood ratio(LLR) detector are proposed for the legitimate users. A tight upper bound on the bit error rate(BER) of the proposed OFDM-GCIM, D-CIM and MCIM at the legitimate users are derived in closed form by employing the ML criteria detection. Computer simulations and numerical results show that the proposed OFDM-GCIM achieves superior error performance than OFDM-IM, and the error performance at the eavesdroppers demonstrates the security of D-CIM and M-CIM.
文摘Face detection is applied to many tasks such as auto focus control, surveillance, user interface, and face recognition. Processing speed and detection accuracy of the face detection have been improved continuously. This paper describes a novel method of fast face detection with multi-scale window search free from image resizing. We adopt statistics of gradient images (SGI) as image features and append an overlapping cell array to improve detection accuracy. The SGI feature is scale invariant and insensitive to small difference of pixel value. These characteristics enable the multi-scale window search without image resizing. Experimental results show that processing speed of our method is 3.66 times faster than a conventional method, adopting HOG features combined to an SVM classifier, without accuracy degradation.
文摘Frameworks are developed to capture the recurring design practices in terms of skeletons of software subsystems/ systems. They are designed ‘abstract’ and ‘incomplete’ and are designed with predefined points of variability, known as hot spots, to be customized later at the time of framework reuse. Frameworks are reusable entities thus demand stricter and rigorous testing in comparison to one-time use application. It would be advisable to guaranty the production of high quality frameworks without incurring heavy costs for their rigorous testing. The overall cost of framework development may be reduced by designing frameworks with high testability. This paper aims at discussing various metric models for testability analysis of frameworks in an attempt to having quantitative data on testability to be used to plan and monitor framework testing activities so that the framework testing effort and hence the overall framework development effort may be brought down. The models considered herein particularly consider that frameworks are inherently abstract and variable in nature.
文摘Quality assurance is of vital importance to bilingual education.Effective promotive measures adopted in interactive bilingual teaching including key point interaction between students and teacher in class,case teaching,stereoscopic teaching were described in detail.The assessment of bilingual education quality via weight distribution of success factors of bilingual education was proposed practically.
文摘Advancing technology has enabled the production of smaller, more energy efficient and cheaper electronic components. Therefore, previously existing many computer and electronics science-engineering ideas have become feasible. One of them is the technology of wireless sensor networks (WSNs), which has become the realization of the necessary technical requirements applicable today with low energy consumption. First, the sensing tasks and the potential sensor networks applications have explored, and reviews of factors influencing the design of sensor networks have provided. Then, the communication architectures for sensor networks have been outlined. PIC-based microcontrollers have used in the design of the sensor nodes. The design of the sensor node has supported with ultra-low power nanowatt technology for very low-cost design. Processing, memory and wireless communication units have integrated on to the sensor nodes and sensors to be used in the designed system which have allowed to be connected to any kind of sensor node. The designed sensor node’s operating system has written with the PIC C language, and PIC operating system has allowed different features such as measuring humidity, temperature, light sensitive and smoke sensor. Computer software has developed for data that can be recorded and monitored from a central location. Decision-making unit has created in the software algorithm and hardware modules for the implementation of decisions taken by the developed sensor nodes. Developed PIC-based sensor nodes have supported a unique voltage unit with renewable energy sources such as solar panel, rechargeable battery, and supercapacitor for energy production and saving. The results of this study are expected to be helpful for the development of WSN especially with renewable energy sources.
基金supported by the European Union’s Horizon 2020 Research and Innovation Program through the SOCIALENERGY Project (No.731767)
文摘This paper contributes to the well-known challenge of active user participation in demand side management(DSM).In DSM, there is a need for modern pricing mechanisms that will be able to effectively incentivize selfishly behaving users in modifying their energy consumption pattern towards system-level goals like energy efficiency.Three generally desired properties of DSM algorithms are: user satisfaction, energy cost minimization and fairness.In this paper, a personalized real-time pricing(P-RTP) mechanism design framework is proposed that fairly allocates the energy cost reduction only to the users that provoke it.Thus, the proposed mechanism achieves significant reduction of the energy cost without sacrificing at all the welfare(user satisfaction)of electricity consumers.The business model that the proposed mechanism envisages is highly competitive flexibility market environments as well as energy cooperatives.
基金funding from the European Union’s Horizon 2020 Research and Innovation Programme(No.731767)in the context of the SOCIALENERGY project.
文摘Liberalized electricity markets,smart grids and high penetration of renewable energy sources(RESs)led to the development of novel markets,whose objective is the harmonization between production and demand,usually noted as real time of flexibility markets.This necessitates the development of novel pricing schemes able to allow energy service providers(ESPs)to maximize their aggregated profits from the traditional markets(trading between wholesale/day-ahead and retail markets)and the innovative flexibility markets.In the same time,ESPs have to offer their end users(consumers)competitive(low cost)energy services.In this context,novel pricing schemes must act,among others,as automated demand side management(DSM)techniques that are able to trigger the desired behavioral changes according to the flexibility market prices in energy consumption curves(ECCs)of the consumers.Energy pricing schemes proposed so far,e.g.realtime pricing,interact in an efficient way with wholesale market.But they do not provide consumers with strong enough financial incentives to modify their energy consumption habits towards energy cost curtailment.Thus,they do not interact efficiently with flexibility markets.Therefore,we develop a flexibility real-time pricing(FRTP)scheme,which offers a dynamically adjustable level of financial incentives to participating users by fairly rewarding the ones that make desirable behavioral changes in their ECCs.Performance evaluation results demonstrate that the proposed FRTP is able to offer a 15%–30%more attractive trade-off between the stacked profits of ESPs,i.e.the sum of the profits from retail and flexibility markets,and the satisfaction of consumers.
文摘Nowadays,virtual machine migration(VMM)is a trending research since it helps in balancing the load of the Cloud effectively.Several VMM-based strategies defined in the literature have considered various metrics,such as load,energy,and migration cost for balancing the load of the model.This paper introduces a novel VMM strategy by considering the load of the Cloud network.Two important aspects of the proposed scheme are the load prediction through the support vector regression(SVR)and the optimal VM placement through the proposed dragonfly-based crow(D-Crow)optimization algorithm.The proposed D-Crow optimization algorithm is developed by incorporating crow search algorithm(CSA)into dragonfly algorithm(DA).Also,the proposed VMM strategy defines a load balancing model based on the energy consumption,load,and the migration cost to achieve the energy-aware VMM.The simulation of the proposed VMM strategy is done based on the metrics such as load,energy consumption,and the migration cost.From the results,it can be shown that the proposed VMM strategy surpassed other comparative models by achieving the minimum values of 7.3719%,10.0368%,and 11.0639%for the load,energy consumption,and migration cost,respectively.
文摘In this paper,we study two fractional models in the Caputo–Fabrizio sense and Atangana–Baleanu sense,in which the effects of malaria infection on mosquito biting behavior and attractiveness of humans are considered.Using Lyapunov theory,we prove the global asymptotic stability of the unique endemic equilibrium of the integer-order model,and the fractional models,whenever the basic reproduction number R0 is greater than one.By using fixed point theory,we prove existence,and conditions of the uniqueness of solutions,as well as the stability and convergence of numerical schemes.Numerical simulations for both models,using fractional Euler method and Adams–Bashforth method,respectively,are provided to confirm the effectiveness of used approximation methods for different values of the fractional-orderγ.
文摘In this work,we use a Predictor–Corrector method to implement and derive an iterative solution of an existing Tuberculosis(TB)model with two fractional derivatives,namely,Caputo–Fabrizio fractional derivative and the new generalized Caputo fractional derivative.We begin by recalling some existing results such as the basic reproduction number R0 and the equilibrium points of the model.Then,we study the global asymptotic stability of disease-free equilibrium of the fractional models.We also prove,for each fractional model,the existence and uniqueness of solutions.An iterative solution of the two models is computed using the Predictor–Corrector method.Using realistic parameter values,we perform numerical simulations for different values of the fractional order.Simulation results permit to conclude that the new generalized Caputo fractional derivative provides a more realistic analysis than the Caputo–Fabrizio fractional derivative and the classical integer-order TB model.