Drone or unmanned aerial vehicle(UAV)technology has undergone significant changes.The technology allows UAV to carry out a wide range of tasks with an increasing level of sophistication,since drones can cover a large ...Drone or unmanned aerial vehicle(UAV)technology has undergone significant changes.The technology allows UAV to carry out a wide range of tasks with an increasing level of sophistication,since drones can cover a large area with cameras.Meanwhile,the increasing number of computer vision applications utilizing deep learning provides a unique insight into such applications.The primary target in UAV-based detection applications is humans,yet aerial recordings are not included in the massive datasets used to train object detectors,which makes it necessary to gather the model data from such platforms.You only look once(YOLO)version 4,RetinaNet,faster region-based convolutional neural network(R-CNN),and cascade R-CNN are several well-known detectors that have been studied in the past using a variety of datasets to replicate rescue scenes.Here,we used the search and rescue(SAR)dataset to train the you only look once version 5(YOLOv5)algorithm to validate its speed,accuracy,and low false detection rate.In comparison to YOLOv4 and R-CNN,the highest mean average accuracy of 96.9%is obtained by YOLOv5.For comparison,experimental findings utilizing the SAR and the human rescue imaging database on land(HERIDAL)datasets are presented.The results show that the YOLOv5-based approach is the most successful human detection model for SAR missions.展开更多
An autonomous microgrid that runs on renewable energy sources is presented in this article.It has a supercon-ducting magnetic energy storage(SMES)device,wind energy-producing devices,and an energy storage battery.Howe...An autonomous microgrid that runs on renewable energy sources is presented in this article.It has a supercon-ducting magnetic energy storage(SMES)device,wind energy-producing devices,and an energy storage battery.However,because such microgrids are nonlinear and the energy they create varies with time,controlling and managing the energy inside them is a difficult issue.Fractional-order proportional integral(FOPI)controller is recommended for the current research to enhance a standalone microgrid’s energy management and performance.The suggested dedicated control for the SMES comprises two loops:the outer loop,which uses the FOPI to regulate the DC-link voltage,and the inner loop,responsible for regulating the SMES current,is constructed using the intelligent FOPI(iFOPI).The FOPI+iFOPI parameters are best developed using the dandelion optimizer(DO)approach to achieve the optimum performance.The suggested FOPI+iFOPI controller’s performance is contrasted with a conventional PI controller for variations in wind speed and microgrid load.The optimal FOPI+iFOPI controller manages the voltage and frequency of the load.The behavior of the microgrid as a reaction to step changes in load and wind speed was measured using the proposed controller.MATLAB simulations were used to evaluate the recommended system’s performance.The results of the simulations showed that throughout all interruptions,the recommended microgrid provided the load with AC power with a constant amplitude and frequency.In addition,the required load demand was accurately reduced.Furthermore,the microgrid functioned incredibly well despite SMES and varying wind speeds.Results obtained under identical conditions were compared with and without the best FOPI+iFOPI controller.When utilizing the optimal FOPI+iFOPI controller with SMES,it was found that the microgrid performed better than the microgrid without SMES.展开更多
This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contra...This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contracts,and Web3.Moreover,its application layer language“Solidity”is widely used in smart contracts across different public and private blockchains.To this end,we wrote a new Ethereum client based on Geth to collect Ethereum node information.Moreover,various web scrapers have been written to collect nodes’historical data fromthe Internet Archive and the Wayback Machine project.The collected data has been compared with two other services that harvest the number of Ethereumnodes.Ourmethod has collectedmore than 30% more than the other services.The data trained a neural network model regarding time series to predict the number of online nodes in the future.Our findings show that there are less than 20% of the same nodes daily,indicating thatmost nodes in the network change frequently.It poses a question of the stability of the network.Furthermore,historical data shows that the top ten countries with Ethereum clients have not changed since 2016.The popular operating system of the underlying nodes has shifted from Windows to Linux over time,increasing node security.The results have also shown that the number of Middle East and North Africa(MENA)Ethereum nodes is neglected compared with nodes recorded from other regions.It opens the door for developing new mechanisms to encourage users from these regions to contribute to this technology.Finally,the model has been trained and demonstrated an accuracy of 92% in predicting the future number of nodes in the Ethereum network.展开更多
Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up t...Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up to 7G.Furthermore,it improves the array gain and directivity,increasing the detection range and angular resolution of radar systems.This study proposes two highly efficient SLL reduction techniques.These techniques are based on the hybridization between either the single convolution or the double convolution algorithms and the genetic algorithm(GA)to develop the Conv/GA andDConv/GA,respectively.The convolution process determines the element’s excitations while the GA optimizes the element spacing.For M elements linear antenna array(LAA),the convolution of the excitation coefficients vector by itself provides a new vector of excitations of length N=(2M−1).This new vector is divided into three different sets of excitations including the odd excitations,even excitations,and middle excitations of lengths M,M−1,andM,respectively.When the same element spacing as the original LAA is used,it is noticed that the odd and even excitations provide a much lower SLL than that of the LAA but with amuch wider half-power beamwidth(HPBW).While the middle excitations give the same HPBWas the original LAA with a relatively higher SLL.Tomitigate the increased HPBWof the odd and even excitations,the element spacing is optimized using the GA.Thereby,the synthesized arrays have the same HPBW as the original LAA with a two-fold reduction in the SLL.Furthermore,for extreme SLL reduction,the DConv/GA is introduced.In this technique,the same procedure of the aforementioned Conv/GA technique is performed on the resultant even and odd excitation vectors.It provides a relatively wider HPBWthan the original LAA with about quad-fold reduction in the SLL.展开更多
The governmental electric utility and the private sector are joining hands to meet the target of electrifying all households by 2024.However,the aforementioned goal is challenged by households that are scattered in re...The governmental electric utility and the private sector are joining hands to meet the target of electrifying all households by 2024.However,the aforementioned goal is challenged by households that are scattered in remote areas.So far,Solar Home Systems(SHS)have mostly been applied to increase electricity access in rural areas.SHSs have continuous constraints to meet electricity demands and cannot run income-generating activities.The current research presents the feasibility study of electrifying Remera village with the smart microgrid as a case study.The renewable energy resources available in Remera are the key sources of electricity in that village.The generation capacity is estimated based on the load profile.The microgrid configurations are simulated with HOMER,and the genetic algorithm is used to analyze the optimum cost.By analyzing the impact of operation and maintenance costs,the results show that the absence of subsidies increases the levelized cost of electricity(COE)five times greater than the electricity price from the public utility.The microgrid made up of PV,diesel generator,and batteries proved to be the most viable solution and ensured continuous power supply to customers.By considering the subsidies,COE reaches 0.186$/kWh,a competitive price with electricity from public utilities in Rwanda.展开更多
Electrolysis tanks are used to smeltmetals based on electrochemical principles,and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures,thus affecting normal pr...Electrolysis tanks are used to smeltmetals based on electrochemical principles,and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures,thus affecting normal production.Aiming at the problems of time-consuming and poor accuracy of existing infrared methods for high-temperature detection of dense pole plates in electrolysis tanks,an infrared dense pole plate anomalous target detection network YOLOv5-RMF based on You Only Look Once version 5(YOLOv5)is proposed.Firstly,we modified the Real-Time Enhanced Super-Resolution Generative Adversarial Network(Real-ESRGAN)by changing the U-shaped network(U-Net)to Attention U-Net,to preprocess the images;secondly,we propose a new Focus module that introduces the Marr operator,which can provide more boundary information for the network;again,because Complete Intersection over Union(CIOU)cannot accommodate target borders that are increasing and decreasing,replace CIOU with Extended Intersection over Union(EIOU),while the loss function is changed to Focal and Efficient IOU(Focal-EIOU)due to the different difficulty of sample detection.On the homemade dataset,the precision of our method is 94%,the recall is 70.8%,and the map@.5 is 83.6%,which is an improvement of 1.3%in precision,9.7%in recall,and 7%in map@.5 over the original network.The algorithm can meet the needs of electrolysis tank pole plate abnormal temperature detection,which can lay a technical foundation for improving production efficiency and reducing production waste.展开更多
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.展开更多
Hot dry rock(HDR)is rich in reserve,widely distributed,green,low-carbon,and has broad development potential and prospects.In this paper,a distributionally robust optimization(DRO)scheduling model for a regionally inte...Hot dry rock(HDR)is rich in reserve,widely distributed,green,low-carbon,and has broad development potential and prospects.In this paper,a distributionally robust optimization(DRO)scheduling model for a regionally integrated energy system(RIES)considering HDR co-generation is proposed.First,the HDR-enhanced geothermal system(HDR-EGS)is introduced into the RIES.HDR-EGS realizes the thermoelectric decoupling of combined heat and power(CHP)through coordinated operation with the regional power grid and the regional heat grid,which enhances the system wind power(WP)feed-in space.Secondly,peak-hour loads are shifted using price demand response guidance in the context of time-of-day pricing.Finally,the optimization objective is established to minimize the total cost in the RIES scheduling cycle and construct a DRO scheduling model for RIES with HDR-EGS.By simulating a real small-scale RIES,the results show that HDR-EGS can effectively promote WP consumption and reduce the operating cost of the system.展开更多
Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various countries.Magnetic resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain images.MRI plays a cru...Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various countries.Magnetic resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain images.MRI plays a crucial role in the diagnosis of brain tumors and the examination of other brain disorders.Typically,manual assessment of MRI images by radiologists or experts is performed to identify brain tumors and abnormalities in the early stages for timely intervention.However,early diagnosis of brain tumors is intricate,necessitating the use of computerized methods.This research introduces an innovative approach for the automated segmentation of brain tumors and a framework for classifying different regions of brain tumors.The proposed methods consist of a pipeline with several stages:preprocessing of brain images with noise removal based on Wiener Filtering,enhancing the brain using Principal Component Analysis(PCA)to obtain well-enhanced images,and then segmenting the region of interest using the Fuzzy C-Means(FCM)clustering technique in the third step.The final step involves classification using the Support Vector Machine(SVM)classifier.The classifier is applied to various types of brain tumors,such as meningioma and pituitary tumors,utilizing the Contrast-Enhanced Magnetic Resonance Imaging(CE-MRI)database.The proposed method demonstrates significantly improved contrast and validates the effectiveness of the classification framework,achieving an average sensitivity of 0.974,specificity of 0.976,accuracy of 0.979,and a Dice Score(DSC)of 0.957.Additionally,this method exhibits a shorter processing time of 0.44 s compared to existing approaches.The performance of this method emphasizes its significance when compared to state-of-the-art methods in terms of sensitivity,specificity,accuracy,and DSC.To enhance the method further in the future,it is feasible to standardize the approach by incorporating a set of classifiers to increase the robustness of the brain classification method.展开更多
Diabetes is a condition that can come to the surface at any point throughout a person’s life. Although Type 1 and Type 2 Diabetes have different triggers that cause them to arise, a person can experience similar comp...Diabetes is a condition that can come to the surface at any point throughout a person’s life. Although Type 1 and Type 2 Diabetes have different triggers that cause them to arise, a person can experience similar complications from either if not monitored and treated accordingly. Through the Diabetes Control and Complications Trial, it was found that a significant way to monitor diabetes is through glucose levels in a person’s body. The research surrounding glucose monitoring dates to the mid-1800s, with the first successful reagent for glucose testing being developed in 1908. Since then, glucose sensing has become one of the most rapidly growing areas of research and development in biosensor technology, creating a competitive market for more advanced, accurate, and convenient glucose monitoring. This article reviews the history of biosensors used for glucose monitoring, and major advancements in biosensor technology to enhance performance and improve quality of life for patients with diabetes.展开更多
The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean energy.In the past,generation systems depended on non-renewable sources such as oil,coal,and gas.Th...The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean energy.In the past,generation systems depended on non-renewable sources such as oil,coal,and gas.Therefore,this paper assesses the performance of a 51 kW PV solar power plant connected to a low-voltage grid to feed an administrative building in the 6th of October City,Egypt.The performance analysis of the considered grid-connected PV system is carried out using power system simulator for Engineering(PSS/E)software.Where the PSS/E program,monitors and uses the power analyzer that displays the parameters and measures some parameters such as current,voltage,total power,power factor,frequency,and current and voltage harmonics,the used inverter from the type of grid inverter for the considered system.The results conclude that when the maximum solar radiation is reached,the maximum current can be obtained from the solar panels,thus obtaining the maximum power and power factor.Decreasing total voltage harmonic distortion,a current harmonic distortion within permissible limits using active harmonic distortion because this type is fast in processing up to 300 microseconds.The connection between solar stations and the national grid makes the system more efficient.展开更多
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes...The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.展开更多
Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical imaging.However,existing models struggle to efficiently extract features from medical images and may squander a...Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical imaging.However,existing models struggle to efficiently extract features from medical images and may squander additional information resources for illness classification.To address these issues,a deep three‐dimensional convolutional neural network incorporating multi‐task learning and attention mechanisms is proposed.An upgraded primary C3D network is utilised to create rougher low‐level feature maps.It introduces a new convolution block that focuses on the structural aspects of the magnetic resonance imaging image and another block that extracts attention weights unique to certain pixel positions in the feature map and multiplies them with the feature map output.Then,several fully connected layers are used to achieve multi‐task learning,generating three outputs,including the primary classification task.The other two outputs employ backpropagation during training to improve the primary classification job.Experimental findings show that the authors’proposed method outperforms current approaches for classifying AD,achieving enhanced classification accuracy and other in-dicators on the Alzheimer's disease Neuroimaging Initiative dataset.The authors demonstrate promise for future disease classification studies.展开更多
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.展开更多
By using the standard PMNS (Pontecorvo-Maki-Nakagawa-Sakata) mixing matrix and applying the rule for the sum of the oscillation probabilities of three neutrinos, the equations of motion were derived in which the Dirac...By using the standard PMNS (Pontecorvo-Maki-Nakagawa-Sakata) mixing matrix and applying the rule for the sum of the oscillation probabilities of three neutrinos, the equations of motion were derived in which the Dirac CP violating phase appeared as an unknown quantity. The equations of motion were separately derived for each of the three possible transitions for flavor-neutrino oscillations. Two roots of those equations were obtained in the form of two formulas for the Dirac CP violating phase with opposite signs. In the mathematical sense, the connection between those formulas was established in order to maintain the continuous process of oscillation of three neutrinos. This made it possible to calculate the numerical value for the Dirac CP violating phase, the Jarlskog invariant and to write the general form of the PMNS mixing matrix in the final form in which all its elements are defined with explicit numerical values.展开更多
The following material is devoted to the generalization of the chaos modeling to random fields in communication channels and its application on the space-time filtering for the incoherent paradigm;that is the purpose ...The following material is devoted to the generalization of the chaos modeling to random fields in communication channels and its application on the space-time filtering for the incoherent paradigm;that is the purpose of this research. The approach, presented hereafter, is based on the “Markovian” trend in modeling of random fields, and it is applied for the first time to the chaos field modeling through the well-known concept of the random “treatment” of deterministic dynamic systems, first presented by A. Kolmogorov, M. Born, etc. The material presents the generalized Stratonovich-Kushner Equations (SKE) for the optimum filtering of chaotic models of random fields and its simplified quasi-optimum solutions. In addition to this, the application of the multi-moment algorithms for quasi-optimum solutions is considered and, it is shown, that for scenarios, when the covariation interval of the input random field is less than the distance between the antenna elements, the gain of the space-time algorithms against their “time” analogies is significant. This is the general result presented in the following.展开更多
The need for higher data rate and higher systems capacity leads to several solutions including higher constellation size, spatial multiplexing, adaptive modulation and Non-Orthogonal Multiple Access (NOMA). Adaptive M...The need for higher data rate and higher systems capacity leads to several solutions including higher constellation size, spatial multiplexing, adaptive modulation and Non-Orthogonal Multiple Access (NOMA). Adaptive Modulation makes use of the user’s location from his base station, such that, closer users get bigger constellation size and hence higher data rate. A similar idea of adaptive modulation that makes use of the user’s locations is the NOMA technique. Here the base station transmits composite signals each for a different user at a different distance from the base station. The transmitted signal is formed by summing different user’s constellations with different weights. The closer the users the less average power constellation is used. This will allow the closer user to the base station to distinguish his constellation and others constellation. The far user will only distinguish his constellation and other user’s data will appear as a small interference added to his signal. In this paper, it is shown that the Adaptive modulation and the NOMA are special cases of the more general Cluster Modulation technique. Therefore, a general frame can be set to design both modulation schemes and better understanding is achieved. This leads to designing a multi-level NOMA and/or flexible adaptive modulation with combined channel coding.展开更多
This study aims to identify the causes of sensor jams and its impact on the operation of vending machines. The vending machine is a machine that automatically dispenses products such as drinks, tickets, sandwiches and...This study aims to identify the causes of sensor jams and its impact on the operation of vending machines. The vending machine is a machine that automatically dispenses products such as drinks, tickets, sandwiches and biscuits, by inserting change or credit card into the machine. This technological feat is due to the advent of sensors. A sensor is a part of the measurement chain, it receives the quantity to be measured and provides information directly linked to this quantity. However, these vending robots are faced with malfunctions linked to sensor jams. The identification of the jam phenomenon was possible thanks to the inspection and monitoring of the various sensors installed on the vending robot. And Cadence software was used to model, control and locate the jammed sensor(s). The various tests were carried out by setting the robot in motion to better understand the causes of the phenomenon. The jam is therefore the phenomenon which triggers the sensors permanently, which causes the automatic vending robot to stop functioning. And this jam was due to the presence of water droplets on the sensor or dirt. This presence of water droplets on the sensor is linked to an increase in temperature. Controlling the temperature and locating the jammed sensor has made it possible to considerably reduce jamming and its harmful effects on the vending machine robot.展开更多
At present,the prediction of brain tumors is performed using Machine Learning(ML)and Deep Learning(DL)algorithms.Although various ML and DL algorithms are adapted to predict brain tumors to some range,some concerns st...At present,the prediction of brain tumors is performed using Machine Learning(ML)and Deep Learning(DL)algorithms.Although various ML and DL algorithms are adapted to predict brain tumors to some range,some concerns still need enhancement,particularly accuracy,sensitivity,false positive and false negative,to improve the brain tumor prediction system symmetrically.Therefore,this work proposed an Extended Deep Learning Algorithm(EDLA)to measure performance parameters such as accuracy,sensitivity,and false positive and false negative rates.In addition,these iterated measures were analyzed by comparing the EDLA method with the Convolutional Neural Network(CNN)way further using the SPSS tool,and respective graphical illustrations were shown.The results were that the mean performance measures for the proposed EDLA algorithm were calculated,and those measured were accuracy(97.665%),sensitivity(97.939%),false positive(3.012%),and false negative(3.182%)for ten iterations.Whereas in the case of the CNN,the algorithm means accuracy gained was 94.287%,mean sensitivity 95.612%,mean false positive 5.328%,and mean false negative 4.756%.These results show that the proposed EDLA method has outperformed existing algorithms,including CNN,and ensures symmetrically improved parameters.Thus EDLA algorithm introduces novelty concerning its performance and particular activation function.This proposed method will be utilized effectively in brain tumor detection in a precise and accurate manner.This algorithm would apply to brain tumor diagnosis and be involved in various medical diagnoses aftermodification.If the quantity of dataset records is enormous,then themethod’s computation power has to be updated.展开更多
文摘Drone or unmanned aerial vehicle(UAV)technology has undergone significant changes.The technology allows UAV to carry out a wide range of tasks with an increasing level of sophistication,since drones can cover a large area with cameras.Meanwhile,the increasing number of computer vision applications utilizing deep learning provides a unique insight into such applications.The primary target in UAV-based detection applications is humans,yet aerial recordings are not included in the massive datasets used to train object detectors,which makes it necessary to gather the model data from such platforms.You only look once(YOLO)version 4,RetinaNet,faster region-based convolutional neural network(R-CNN),and cascade R-CNN are several well-known detectors that have been studied in the past using a variety of datasets to replicate rescue scenes.Here,we used the search and rescue(SAR)dataset to train the you only look once version 5(YOLOv5)algorithm to validate its speed,accuracy,and low false detection rate.In comparison to YOLOv4 and R-CNN,the highest mean average accuracy of 96.9%is obtained by YOLOv5.For comparison,experimental findings utilizing the SAR and the human rescue imaging database on land(HERIDAL)datasets are presented.The results show that the YOLOv5-based approach is the most successful human detection model for SAR missions.
基金This research was funded by the Deputyship for Research and Innovation,Ministry of Education,Saudi Arabia,through the University of Tabuk,Grant Number S-1443-0123.
文摘An autonomous microgrid that runs on renewable energy sources is presented in this article.It has a supercon-ducting magnetic energy storage(SMES)device,wind energy-producing devices,and an energy storage battery.However,because such microgrids are nonlinear and the energy they create varies with time,controlling and managing the energy inside them is a difficult issue.Fractional-order proportional integral(FOPI)controller is recommended for the current research to enhance a standalone microgrid’s energy management and performance.The suggested dedicated control for the SMES comprises two loops:the outer loop,which uses the FOPI to regulate the DC-link voltage,and the inner loop,responsible for regulating the SMES current,is constructed using the intelligent FOPI(iFOPI).The FOPI+iFOPI parameters are best developed using the dandelion optimizer(DO)approach to achieve the optimum performance.The suggested FOPI+iFOPI controller’s performance is contrasted with a conventional PI controller for variations in wind speed and microgrid load.The optimal FOPI+iFOPI controller manages the voltage and frequency of the load.The behavior of the microgrid as a reaction to step changes in load and wind speed was measured using the proposed controller.MATLAB simulations were used to evaluate the recommended system’s performance.The results of the simulations showed that throughout all interruptions,the recommended microgrid provided the load with AC power with a constant amplitude and frequency.In addition,the required load demand was accurately reduced.Furthermore,the microgrid functioned incredibly well despite SMES and varying wind speeds.Results obtained under identical conditions were compared with and without the best FOPI+iFOPI controller.When utilizing the optimal FOPI+iFOPI controller with SMES,it was found that the microgrid performed better than the microgrid without SMES.
基金the Arab Open University for Funding this work through AOU Research Fund No.(AOURG-2023-006).
文摘This work carried out a measurement study of the Ethereum Peer-to-Peer(P2P)network to gain a better understanding of the underlying nodes.Ethereum was applied because it pioneered distributed applications,smart contracts,and Web3.Moreover,its application layer language“Solidity”is widely used in smart contracts across different public and private blockchains.To this end,we wrote a new Ethereum client based on Geth to collect Ethereum node information.Moreover,various web scrapers have been written to collect nodes’historical data fromthe Internet Archive and the Wayback Machine project.The collected data has been compared with two other services that harvest the number of Ethereumnodes.Ourmethod has collectedmore than 30% more than the other services.The data trained a neural network model regarding time series to predict the number of online nodes in the future.Our findings show that there are less than 20% of the same nodes daily,indicating thatmost nodes in the network change frequently.It poses a question of the stability of the network.Furthermore,historical data shows that the top ten countries with Ethereum clients have not changed since 2016.The popular operating system of the underlying nodes has shifted from Windows to Linux over time,increasing node security.The results have also shown that the number of Middle East and North Africa(MENA)Ethereum nodes is neglected compared with nodes recorded from other regions.It opens the door for developing new mechanisms to encourage users from these regions to contribute to this technology.Finally,the model has been trained and demonstrated an accuracy of 92% in predicting the future number of nodes in the Ethereum network.
基金Research Supporting Project Number(RSPD2023R 585),King Saud University,Riyadh,Saudi Arabia.
文摘Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up to 7G.Furthermore,it improves the array gain and directivity,increasing the detection range and angular resolution of radar systems.This study proposes two highly efficient SLL reduction techniques.These techniques are based on the hybridization between either the single convolution or the double convolution algorithms and the genetic algorithm(GA)to develop the Conv/GA andDConv/GA,respectively.The convolution process determines the element’s excitations while the GA optimizes the element spacing.For M elements linear antenna array(LAA),the convolution of the excitation coefficients vector by itself provides a new vector of excitations of length N=(2M−1).This new vector is divided into three different sets of excitations including the odd excitations,even excitations,and middle excitations of lengths M,M−1,andM,respectively.When the same element spacing as the original LAA is used,it is noticed that the odd and even excitations provide a much lower SLL than that of the LAA but with amuch wider half-power beamwidth(HPBW).While the middle excitations give the same HPBWas the original LAA with a relatively higher SLL.Tomitigate the increased HPBWof the odd and even excitations,the element spacing is optimized using the GA.Thereby,the synthesized arrays have the same HPBW as the original LAA with a two-fold reduction in the SLL.Furthermore,for extreme SLL reduction,the DConv/GA is introduced.In this technique,the same procedure of the aforementioned Conv/GA technique is performed on the resultant even and odd excitation vectors.It provides a relatively wider HPBWthan the original LAA with about quad-fold reduction in the SLL.
文摘The governmental electric utility and the private sector are joining hands to meet the target of electrifying all households by 2024.However,the aforementioned goal is challenged by households that are scattered in remote areas.So far,Solar Home Systems(SHS)have mostly been applied to increase electricity access in rural areas.SHSs have continuous constraints to meet electricity demands and cannot run income-generating activities.The current research presents the feasibility study of electrifying Remera village with the smart microgrid as a case study.The renewable energy resources available in Remera are the key sources of electricity in that village.The generation capacity is estimated based on the load profile.The microgrid configurations are simulated with HOMER,and the genetic algorithm is used to analyze the optimum cost.By analyzing the impact of operation and maintenance costs,the results show that the absence of subsidies increases the levelized cost of electricity(COE)five times greater than the electricity price from the public utility.The microgrid made up of PV,diesel generator,and batteries proved to be the most viable solution and ensured continuous power supply to customers.By considering the subsidies,COE reaches 0.186$/kWh,a competitive price with electricity from public utilities in Rwanda.
文摘Electrolysis tanks are used to smeltmetals based on electrochemical principles,and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures,thus affecting normal production.Aiming at the problems of time-consuming and poor accuracy of existing infrared methods for high-temperature detection of dense pole plates in electrolysis tanks,an infrared dense pole plate anomalous target detection network YOLOv5-RMF based on You Only Look Once version 5(YOLOv5)is proposed.Firstly,we modified the Real-Time Enhanced Super-Resolution Generative Adversarial Network(Real-ESRGAN)by changing the U-shaped network(U-Net)to Attention U-Net,to preprocess the images;secondly,we propose a new Focus module that introduces the Marr operator,which can provide more boundary information for the network;again,because Complete Intersection over Union(CIOU)cannot accommodate target borders that are increasing and decreasing,replace CIOU with Extended Intersection over Union(EIOU),while the loss function is changed to Focal and Efficient IOU(Focal-EIOU)due to the different difficulty of sample detection.On the homemade dataset,the precision of our method is 94%,the recall is 70.8%,and the map@.5 is 83.6%,which is an improvement of 1.3%in precision,9.7%in recall,and 7%in map@.5 over the original network.The algorithm can meet the needs of electrolysis tank pole plate abnormal temperature detection,which can lay a technical foundation for improving production efficiency and reducing production waste.
文摘Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this paper.Here,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its performance.Then,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation platforms.Subsequently,it is used toward secure communication application scenarios.Taking it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)model.Eventually,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
基金King Saud University for funding this research through the Researchers Supporting Program Number(RSPD2024R704),King Saud University,Riyadh,Saudi Arabia.
文摘Hot dry rock(HDR)is rich in reserve,widely distributed,green,low-carbon,and has broad development potential and prospects.In this paper,a distributionally robust optimization(DRO)scheduling model for a regionally integrated energy system(RIES)considering HDR co-generation is proposed.First,the HDR-enhanced geothermal system(HDR-EGS)is introduced into the RIES.HDR-EGS realizes the thermoelectric decoupling of combined heat and power(CHP)through coordinated operation with the regional power grid and the regional heat grid,which enhances the system wind power(WP)feed-in space.Secondly,peak-hour loads are shifted using price demand response guidance in the context of time-of-day pricing.Finally,the optimization objective is established to minimize the total cost in the RIES scheduling cycle and construct a DRO scheduling model for RIES with HDR-EGS.By simulating a real small-scale RIES,the results show that HDR-EGS can effectively promote WP consumption and reduce the operating cost of the system.
基金supported by the Deanship of Scientific Research,Najran University,Kingdom of Saudi Arabia,for funding this work under the Distinguished Research Funding Program Grant Code Number(NU/DRP/SERC/12/16).
文摘Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various countries.Magnetic resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain images.MRI plays a crucial role in the diagnosis of brain tumors and the examination of other brain disorders.Typically,manual assessment of MRI images by radiologists or experts is performed to identify brain tumors and abnormalities in the early stages for timely intervention.However,early diagnosis of brain tumors is intricate,necessitating the use of computerized methods.This research introduces an innovative approach for the automated segmentation of brain tumors and a framework for classifying different regions of brain tumors.The proposed methods consist of a pipeline with several stages:preprocessing of brain images with noise removal based on Wiener Filtering,enhancing the brain using Principal Component Analysis(PCA)to obtain well-enhanced images,and then segmenting the region of interest using the Fuzzy C-Means(FCM)clustering technique in the third step.The final step involves classification using the Support Vector Machine(SVM)classifier.The classifier is applied to various types of brain tumors,such as meningioma and pituitary tumors,utilizing the Contrast-Enhanced Magnetic Resonance Imaging(CE-MRI)database.The proposed method demonstrates significantly improved contrast and validates the effectiveness of the classification framework,achieving an average sensitivity of 0.974,specificity of 0.976,accuracy of 0.979,and a Dice Score(DSC)of 0.957.Additionally,this method exhibits a shorter processing time of 0.44 s compared to existing approaches.The performance of this method emphasizes its significance when compared to state-of-the-art methods in terms of sensitivity,specificity,accuracy,and DSC.To enhance the method further in the future,it is feasible to standardize the approach by incorporating a set of classifiers to increase the robustness of the brain classification method.
文摘Diabetes is a condition that can come to the surface at any point throughout a person’s life. Although Type 1 and Type 2 Diabetes have different triggers that cause them to arise, a person can experience similar complications from either if not monitored and treated accordingly. Through the Diabetes Control and Complications Trial, it was found that a significant way to monitor diabetes is through glucose levels in a person’s body. The research surrounding glucose monitoring dates to the mid-1800s, with the first successful reagent for glucose testing being developed in 1908. Since then, glucose sensing has become one of the most rapidly growing areas of research and development in biosensor technology, creating a competitive market for more advanced, accurate, and convenient glucose monitoring. This article reviews the history of biosensors used for glucose monitoring, and major advancements in biosensor technology to enhance performance and improve quality of life for patients with diabetes.
文摘The generation of photovoltaic(PV)solar energy is increasing continuously because it is renewable,unlimited,and clean energy.In the past,generation systems depended on non-renewable sources such as oil,coal,and gas.Therefore,this paper assesses the performance of a 51 kW PV solar power plant connected to a low-voltage grid to feed an administrative building in the 6th of October City,Egypt.The performance analysis of the considered grid-connected PV system is carried out using power system simulator for Engineering(PSS/E)software.Where the PSS/E program,monitors and uses the power analyzer that displays the parameters and measures some parameters such as current,voltage,total power,power factor,frequency,and current and voltage harmonics,the used inverter from the type of grid inverter for the considered system.The results conclude that when the maximum solar radiation is reached,the maximum current can be obtained from the solar panels,thus obtaining the maximum power and power factor.Decreasing total voltage harmonic distortion,a current harmonic distortion within permissible limits using active harmonic distortion because this type is fast in processing up to 300 microseconds.The connection between solar stations and the national grid makes the system more efficient.
基金funded by Taif University,Taif,Saudi Arabia,Project No.(TUDSPP-2024-139).
文摘The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers.
基金the Deanship of Scientific Research at King Khalid University for funding this work through General Research Project under grant number(GRP/75/44).
文摘Deep learning has recently become a viable approach for classifying Alzheimer's disease(AD)in medical imaging.However,existing models struggle to efficiently extract features from medical images and may squander additional information resources for illness classification.To address these issues,a deep three‐dimensional convolutional neural network incorporating multi‐task learning and attention mechanisms is proposed.An upgraded primary C3D network is utilised to create rougher low‐level feature maps.It introduces a new convolution block that focuses on the structural aspects of the magnetic resonance imaging image and another block that extracts attention weights unique to certain pixel positions in the feature map and multiplies them with the feature map output.Then,several fully connected layers are used to achieve multi‐task learning,generating three outputs,including the primary classification task.The other two outputs employ backpropagation during training to improve the primary classification job.Experimental findings show that the authors’proposed method outperforms current approaches for classifying AD,achieving enhanced classification accuracy and other in-dicators on the Alzheimer's disease Neuroimaging Initiative dataset.The authors demonstrate promise for future disease classification studies.
基金the Deanship of Scientific Research,Najran University,Kingdom of Saudi Arabia,for funding this work under the Research Groups Funding Program Grant Code Number(NU/RG/SERC/12/43).
文摘Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
文摘By using the standard PMNS (Pontecorvo-Maki-Nakagawa-Sakata) mixing matrix and applying the rule for the sum of the oscillation probabilities of three neutrinos, the equations of motion were derived in which the Dirac CP violating phase appeared as an unknown quantity. The equations of motion were separately derived for each of the three possible transitions for flavor-neutrino oscillations. Two roots of those equations were obtained in the form of two formulas for the Dirac CP violating phase with opposite signs. In the mathematical sense, the connection between those formulas was established in order to maintain the continuous process of oscillation of three neutrinos. This made it possible to calculate the numerical value for the Dirac CP violating phase, the Jarlskog invariant and to write the general form of the PMNS mixing matrix in the final form in which all its elements are defined with explicit numerical values.
文摘The following material is devoted to the generalization of the chaos modeling to random fields in communication channels and its application on the space-time filtering for the incoherent paradigm;that is the purpose of this research. The approach, presented hereafter, is based on the “Markovian” trend in modeling of random fields, and it is applied for the first time to the chaos field modeling through the well-known concept of the random “treatment” of deterministic dynamic systems, first presented by A. Kolmogorov, M. Born, etc. The material presents the generalized Stratonovich-Kushner Equations (SKE) for the optimum filtering of chaotic models of random fields and its simplified quasi-optimum solutions. In addition to this, the application of the multi-moment algorithms for quasi-optimum solutions is considered and, it is shown, that for scenarios, when the covariation interval of the input random field is less than the distance between the antenna elements, the gain of the space-time algorithms against their “time” analogies is significant. This is the general result presented in the following.
文摘The need for higher data rate and higher systems capacity leads to several solutions including higher constellation size, spatial multiplexing, adaptive modulation and Non-Orthogonal Multiple Access (NOMA). Adaptive Modulation makes use of the user’s location from his base station, such that, closer users get bigger constellation size and hence higher data rate. A similar idea of adaptive modulation that makes use of the user’s locations is the NOMA technique. Here the base station transmits composite signals each for a different user at a different distance from the base station. The transmitted signal is formed by summing different user’s constellations with different weights. The closer the users the less average power constellation is used. This will allow the closer user to the base station to distinguish his constellation and others constellation. The far user will only distinguish his constellation and other user’s data will appear as a small interference added to his signal. In this paper, it is shown that the Adaptive modulation and the NOMA are special cases of the more general Cluster Modulation technique. Therefore, a general frame can be set to design both modulation schemes and better understanding is achieved. This leads to designing a multi-level NOMA and/or flexible adaptive modulation with combined channel coding.
文摘This study aims to identify the causes of sensor jams and its impact on the operation of vending machines. The vending machine is a machine that automatically dispenses products such as drinks, tickets, sandwiches and biscuits, by inserting change or credit card into the machine. This technological feat is due to the advent of sensors. A sensor is a part of the measurement chain, it receives the quantity to be measured and provides information directly linked to this quantity. However, these vending robots are faced with malfunctions linked to sensor jams. The identification of the jam phenomenon was possible thanks to the inspection and monitoring of the various sensors installed on the vending robot. And Cadence software was used to model, control and locate the jammed sensor(s). The various tests were carried out by setting the robot in motion to better understand the causes of the phenomenon. The jam is therefore the phenomenon which triggers the sensors permanently, which causes the automatic vending robot to stop functioning. And this jam was due to the presence of water droplets on the sensor or dirt. This presence of water droplets on the sensor is linked to an increase in temperature. Controlling the temperature and locating the jammed sensor has made it possible to considerably reduce jamming and its harmful effects on the vending machine robot.
基金supported by Project No.R-2023-23 of the Deanship of Scientific Research at Majmaah University.
文摘At present,the prediction of brain tumors is performed using Machine Learning(ML)and Deep Learning(DL)algorithms.Although various ML and DL algorithms are adapted to predict brain tumors to some range,some concerns still need enhancement,particularly accuracy,sensitivity,false positive and false negative,to improve the brain tumor prediction system symmetrically.Therefore,this work proposed an Extended Deep Learning Algorithm(EDLA)to measure performance parameters such as accuracy,sensitivity,and false positive and false negative rates.In addition,these iterated measures were analyzed by comparing the EDLA method with the Convolutional Neural Network(CNN)way further using the SPSS tool,and respective graphical illustrations were shown.The results were that the mean performance measures for the proposed EDLA algorithm were calculated,and those measured were accuracy(97.665%),sensitivity(97.939%),false positive(3.012%),and false negative(3.182%)for ten iterations.Whereas in the case of the CNN,the algorithm means accuracy gained was 94.287%,mean sensitivity 95.612%,mean false positive 5.328%,and mean false negative 4.756%.These results show that the proposed EDLA method has outperformed existing algorithms,including CNN,and ensures symmetrically improved parameters.Thus EDLA algorithm introduces novelty concerning its performance and particular activation function.This proposed method will be utilized effectively in brain tumor detection in a precise and accurate manner.This algorithm would apply to brain tumor diagnosis and be involved in various medical diagnoses aftermodification.If the quantity of dataset records is enormous,then themethod’s computation power has to be updated.