Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 361 - 390 of 57898

Full-Text Articles in Physical Sciences and Mathematics

Development And Application Of Simulation Platform For Aquatic Movement Of An Amphibious Armored Vehicle, Mingzhe Chen, Yunzheng Song, Pei Wang, Lei Zhang Jun 2024

Development And Application Of Simulation Platform For Aquatic Movement Of An Amphibious Armored Vehicle, Mingzhe Chen, Yunzheng Song, Pei Wang, Lei Zhang

Journal of System Simulation

Abstract: In order to design and verify the fire control system(FCS) algorithm of amphibious assault vehicle under heavy wind and wave conditions, a real-time simulation platform is developed. The traditional single rigid body dynamic model can't describe the body-turret-barrel dynamic coupling relationship and it is not suitable for FCS simulation with high dynamic characteristics. Twist-wrench method is used to establish the multiple rigid body dynamic model of vehicle, the buoyancy and the hydrodynamic calculation is carried out according to the body and the moving relationship between visual generated waves, and the hydrodynamic coefficient is obtained by the computational fluid dynamic …


Curriculum Learning-Based Simulation Of Uav Air Combat Under Sparse Rewards, Jingyu Zhu, Hongli Zhang, Minchi Kuang, Heng Shi, Jihong Zhu, Zhi Qiao, Wenqing Zhou Jun 2024

Curriculum Learning-Based Simulation Of Uav Air Combat Under Sparse Rewards, Jingyu Zhu, Hongli Zhang, Minchi Kuang, Heng Shi, Jihong Zhu, Zhi Qiao, Wenqing Zhou

Journal of System Simulation

Abstract: To address the limited exploration capabilities and sparse rewards of conventional reinforcement learning methods in air combat environment, a curriculum learning distributed proximal policy optimization (CLDPPO) reinforcement learning algorithm is proposed. A reward function informed by professional empirical knowledge is integrated, a discrete action space is developed, and a global observation and local value and decision network featuring separated global and local observations is established. A methodology for unmanned aerial vehicles UAVs is presented to acquire combat expertise through a sequence of fundamental courses that progressively intensify in their offensive, defensive, and comprehensive content. The experimental results show that …


Design Of Real-Time Simulation & Test Software Based On Windows/Rtx, Yongbo Li, Runmei Tian, Hui Zhang, Shanpeng Guo, Qi Li Jun 2024

Design Of Real-Time Simulation & Test Software Based On Windows/Rtx, Yongbo Li, Runmei Tian, Hui Zhang, Shanpeng Guo, Qi Li

Journal of System Simulation

Abstract: Aiming at the limited real-time performance of traditional test software and the low generality of traditional simulation interface software, a real-time simulation software based on Windows/RTX is designed to meet the requirements of unit testing and control system simulation verification of semiphysical simulation software. Through modular design, GUI layer human-computer interface and RTX layer real-time operation program are developed. To ensure the real-time, the lock-free cyclic buffer plus dual-threading technology is used to solve the timeout problem of serial data transmission and reception when the simulation step size is 1 ms under RTX environment. A timeout detection algorithm is …


Cooperative Ant Colony Algorithm Combining Evaluation Reward And Punishment Mechanism And Neighborhood Dynamic Degradation, Yujie Wang, Xiaoming You, Sheng Liu Jun 2024

Cooperative Ant Colony Algorithm Combining Evaluation Reward And Punishment Mechanism And Neighborhood Dynamic Degradation, Yujie Wang, Xiaoming You, Sheng Liu

Journal of System Simulation

Abstract: To address the slow convergence and the tendency to fall into local optimality in solving TSP, a cooperative ant colony algorithm combining evaluation reward and punishment mechanism and neighborhood dynamic degradation (ENCACO) is proposed. The paths are classified into active and abandon paths according to the path evaluation value, and with the path evaluation value as the weight, the different pheromone reward and punishment strategies are adopted for the two types of paths to accelerate the convergence speed of the algorithm. Through the neighborhood dynamic degradation strategy, and the neighborhood radius is used to divide the set of cities …


Construction Of A Virtual Interactive System For Orchards Based On Digital Twin, Hongjun Wang, Junqiang Lin, Xiangjun Zou, Po Zhang, Mingxuan Zhou, Weirui Zou, Yunchao Tang, Lufeng Luo Jun 2024

Construction Of A Virtual Interactive System For Orchards Based On Digital Twin, Hongjun Wang, Junqiang Lin, Xiangjun Zou, Po Zhang, Mingxuan Zhou, Weirui Zou, Yunchao Tang, Lufeng Luo

Journal of System Simulation

Abstract: Aiming at the low visibility, poor real-time, weak adaptability and single interaction mode in orchard planting management system, a six-dimensional model of orchard digital twin system for planting management process is proposed. The system model construction theory and technology system is discussed from four aspects, entity modeling of management elements, dynamic modeling of management process, simulation modeling of management system and optimization modeling of management strategy. Based on the six-dimensional model, supported by the theory and technology system, the virtual interactive system architecture of the orchard based on the digital twin is designed, and the key technologies of the …


Dynamic Air Defense Resource Allocation Optimization Based On Improved Differential Evolution Algorithm, Tianyu Luo, Lining Xing, Rui Wang, Ling Wang, Jianmai Shi, Xin Sun Jun 2024

Dynamic Air Defense Resource Allocation Optimization Based On Improved Differential Evolution Algorithm, Tianyu Luo, Lining Xing, Rui Wang, Ling Wang, Jianmai Shi, Xin Sun

Journal of System Simulation

Abstract: Based on the integrated performance of weapon equipments such as radars, launchers and missiles, a mixed-integer decision model that minimizes the total target intercept value and the probability of survival based on Target-Set, Resource-Set is developed. A new improved differential evolutionary algorithm has been introduced to solve the problem, and the initial solutions is generated by using the reverse learning strategies to ensure the quality of the initial populations. An inspiration rule for the fast repair and reconstruction is designed to work at multi-stage to improve the search capability of the algorithm. The simulation experiment results show the algorithm's …


Just-In-Time Learning Energy Consumption Predictive Modeling Method In Multi-Condition Production Process, Sheng Wei, Yan Wang, Zhicheng Ji Jun 2024

Just-In-Time Learning Energy Consumption Predictive Modeling Method In Multi-Condition Production Process, Sheng Wei, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: Aiming at the problem that the global energy consumption prediction model is only suitable for part of the prediction sample and the model is computationally intensive, the idea of just-in-time learning is introduced, and the local weighted partial least squares method combined with the energy consumption model is used to establish a temporary local energy consumption prediction model. The inertia weights of the particle swarm algorithm are improved, considering the effects of particle fitness, number of iterations and population size on the convergence speed and convergence accuracy of the particle swarm algorithm, a nonlinear change adaptive inertia weight strategy …


Completion Time Simulation Prediction Method For Aircraft Assembly Process With Batch And Sortie, Changjian Jiang, Hu Fan, Tao Luo, Wen Yuan, Zehao He Jun 2024

Completion Time Simulation Prediction Method For Aircraft Assembly Process With Batch And Sortie, Changjian Jiang, Hu Fan, Tao Luo, Wen Yuan, Zehao He

Journal of System Simulation

Abstract: Aiming at the product differentiation analysis limitation of traditional discrete event simulation method, a simulation prediction method for aircraft assembly process with batch and sortie is proposed. Around the aircraft sortie number, the formal definition of various basic elements and interactions in the assembly process with batch and sortie is studied, and the construction of station and whole line simulation model is carried out. The simulation promotion framework and execution mechanism supporting the product differentiation analysis are studied. Based on the simulation results, a method for predicting the completion time of sorties based on interval estimation method is proposed. …


The Confluence, Volume3, Issue 2, Full Issue Jun 2024

The Confluence, Volume3, Issue 2, Full Issue

The Confluence

No abstract provided.


Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih Jun 2024

Unraveling The Versatility And Impact Of Multi-Objective Optimization: Algorithms, Applications, And Trends For Solving Complex Real-World Problems, Noor A. Rashed, Yossra H. Ali, Tarik A. Rashid, A. Salih

Journal of Soft Computing and Computer Applications

Multi-Objective Optimization (MOO) techniques have become increasingly popular in recent years due to their potential for solving real-world problems in various fields, such as logistics, finance, environmental management, and engineering. These techniques offer comprehensive solutions that traditional single-objective approaches fail to provide. Due to the many innovative algorithms, it has been challenging for researchers to choose the optimal algorithms for solving their problems. This paper examines recently developed MOO-based algorithms. MOO is introduced along with Pareto optimality and trade-off analysis. In real-world case studies, MOO algorithms address complicated decision-making challenges. This paper examines algorithmic methods, applications, trends, and issues in …


Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer Jun 2024

Optimization Of Resources Allocation Using Evolutionary Deep Learning, Sanaa Ali Jabber, Soukaena H. Hashem, Shatha H. Jafer

Journal of Soft Computing and Computer Applications

The Bidirectional Long Short-Term Memory (Bi-LSTM) network structure enables data analysis, enhances decision-making processes, and optimizes resource allocation in cloud computing systems. However, achieving peak network performance relies heavily on choosing the hyperparameters for configuring the network. Enhancing resource allocation improves the Service Level Agreement (SLA) by ensuring efficient utilization and allocation of computational resources based on dynamic workload demands. This paper proposes an approach that integrates a Multi-Objective Evolutionary Algorithm (MOEA) with deep learning techniques to address this challenge. This approach combines the optimization capabilities of MOEA with the learning predictive models to establish a framework for resource allocation …


Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif Jun 2024

Face Mask Detection Based On Deep Learning: A Review, Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif

Journal of Soft Computing and Computer Applications

The coronavirus disease 2019 outbreak caused widespread disruption. The World Health Organization has recommended wearing face masks, along with other public health measures, such as social distancing, following medical guidelines, and thermal scanning, to reduce transmission, reduce the burden on healthcare systems, and protect population groups. However, wearing a mask, which acts as a barrier or shield to reduce transmission of infection from infected individuals, hides most facial features, such as the nose, mouth, and chin, on which face detection systems depend, which leads to the weakness of these systems. This paper aims to provide essential insights for researchers and …


Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali Jun 2024

Strangeness Detection From Crowded Video Scenes By Hand-Crafted And Deep Learning Features, Ali A. Hussan, Shaimaa H. Shaker, Akbas Ezaldeen Ali

Journal of Soft Computing and Computer Applications

Video anomaly detection is one of the trickiest issues in intelligent video surveillance because of the complexity of real data and the hazy definition of anomalies. Since abnormal occurrences typically seem different from normal events and move differently. The global optical flow was determined with the maximum accuracy and speed using the Farneback approach for calculating the magnitudes. Two approaches have been used in this study to detect strangeness in the video. These approaches are Deep Learning (DL) and manuality. The first method uses the activity map's development of entropy to detect the oddity in the video using a particular …


A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy Jun 2024

A Comprehensive Analysis Of Deep Learning And Swarm Intelligence Techniques To Enhance Vehicular Ad-Hoc Network Performance, Hussein K. Abdul Atheem, Israa T. Ali, Faiz A. Al Alawy

Journal of Soft Computing and Computer Applications

The primary elements of Intelligent Transportation Systems (ITSs) have become Vehicular Ad-hoc NETworks (VANETs), allowing communication between the infrastructure environment and vehicles. The large amount of data gathered by connected vehicles has simplified how Deep Learning (DL) techniques are applied in VANETs. DL is a subfield of artificial intelligence that provides improved learning algorithms able to analyzing and process complex and heterogeneous data. This study explains the power of DL in VANETs, considering applications like decision-making, vehicle localization, anomaly detection, traffic prediction and intelligent routing, various types of DL, including Recurrent Neural Networks (RNNs), and Convolutional Neural Networks (CNNs) are …


A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi Jun 2024

A Novel Approach To Generate Dynamic S-Box For Lightweight Cryptography Based On The 3d Hindmarsh Rose Model, Ala'a Talib Khudhair, Abeer Tariq Maolood, Ekhlas Khalaf Gbashi

Journal of Soft Computing and Computer Applications

In lightweight cryptography, the absence of an S-Box in some algorithms like speck, Tiny Encryption Algorithm, or the presence of a fixed S-Box in others like Advanced Encryption Standard can make them more vulnerable to attacks. This study introduces an innovative method for creating a dynamic 6-bit S-Box (8×8) in octal format. The generating process of S-Box passes through two phases. The first is the number initialization phase. This phase involves generating sequence numbers 1, sequence numbers 2, and sequence numbers 3 depending on Xi, Yi, and Zi values generated using the 3D Hindmarsh …


The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana Jun 2024

The Robust Digital Video Watermarking Methods: A Comparative Study, Ebtehal Talib, Abeer Salim Jamil, Nidaa Flaih Hassan, Muhammad Ehsan Rana

Journal of Soft Computing and Computer Applications

Digital data such as images, audio, and video have become widely available since the invention of the Internet. Due to the ease of access to this multimedia, challenges such as content authentication, security, copyright protection, and ownership determination arose. In this paper, an explanation of watermark techniques, embedding, and extraction methods are provided. It further discusses the utilization of artificial intelligence methods and conversion of host media from the spatial domain to the frequency domain; these methods aim to improve the quality of watermarks. This paper also included a classification of the basic characteristics of the digital watermark and the …


Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal Jun 2024

Foxann: A Method For Boosting Neural Network Performance, Mahmood A. Jumaah, Yossra H. Ali, Tarik A. Rashid, S. Vimal

Journal of Soft Computing and Computer Applications

Artificial neural networks play a crucial role in machine learning and there is a need to improve their performance. This paper presents FOXANN, a novel classification model that combines the recently developed Fox optimizer with ANN to solve ML problems. Fox optimizer replaces the backpropagation algorithm in ANN; optimizes synaptic weights; and achieves high classification accuracy with a minimum loss, improved model generalization, and interpretability. The performance of FOXANN is evaluated on three standard datasets: Iris Flower, Breast Cancer Wisconsin, and Wine. The results presented in this paper are derived from 100 epochs using 10-fold cross-validation, ensuring that all dataset …


Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy Jun 2024

Surveying Machine Learning In Cyberattack Datasets: A Comprehensive Analysis, Azhar F. Al-Zubidi, Alaa Kadhim Farhan, El-Sayed M. El-Kenawy

Journal of Soft Computing and Computer Applications

Cyberattacks have become one of the most significant security threats that have emerged in the last couple of years. It is imperative to comprehend such attacks; thus, analyzing various kinds of cyberattack datasets assists in constructing the precise intrusion detection models. This paper tries to analyze many of the available cyberattack datasets and compare them with many of the fields that are used to detect and predict cyberattack, like the Internet of Things (IoT) traffic-based, network traffic-based, cyber-physical system, and web traffic-based. In the present paper, an overview of each of them is provided, as well as the course of …


Addressing Social Inequalities Using Ai, Big Data, And Machine Learning, Erica L. Jensen, Lakell Archer, Sumaya Ali Jun 2024

Addressing Social Inequalities Using Ai, Big Data, And Machine Learning, Erica L. Jensen, Lakell Archer, Sumaya Ali

Journal of Nonprofit Innovation

No abstract provided.


Assessment And Prediction Of Meteorological Drought Using Machine Learning Algorithms And Climate Data, Khalid En-Nagre, Mourad Aqnouy, Ayoub Ouarka, Syed Ali Asad Naqvi, Ismail Bouizrou, Jamal Eddine Stitou El Messari, Aqil Tariq, Walid Soufan, Wenzhao Li, Hesham El-Askary Jun 2024

Assessment And Prediction Of Meteorological Drought Using Machine Learning Algorithms And Climate Data, Khalid En-Nagre, Mourad Aqnouy, Ayoub Ouarka, Syed Ali Asad Naqvi, Ismail Bouizrou, Jamal Eddine Stitou El Messari, Aqil Tariq, Walid Soufan, Wenzhao Li, Hesham El-Askary

Mathematics, Physics, and Computer Science Faculty Articles and Research

Monitoring drought in semi-arid regions due to climate change is of paramount importance. This study, conducted in Morocco’s Upper Drâa Basin (UDB), analyzed data spanning from 1980 to 2019, focusing on the calculation of drought indices, specifically the Standardized Precipitation Index (SPI) and the Standardized Precipitation Evapotranspiration Index (SPEI) at multiple timescales (1, 3, 9, 12 months). Trends were assessed using statistical methods such as the Mann-Kendall test and the Sen’s Slope estimator. Four significant machine learning (ML) algorithms, including Random Forest, Voting Regressor, AdaBoost Regressor, and K-Nearest Neighbors Regressor, were evaluated to predict the SPEI values for both three …


Improving Flextype: Ambiguous Text Input For Users With Visual Impairments, Dylan Gaines, Keith Vertanen Jun 2024

Improving Flextype: Ambiguous Text Input For Users With Visual Impairments, Dylan Gaines, Keith Vertanen

Michigan Tech Publications, Part 2

We present an improved version of the FlexType interface for nonvisual text input. FlexType enables nonvisual text input on mobile touchscreen devices by allowing users to select from a small number of character groups with gestures instead of targeting letters at specific screen locations. Based on an interview with users who are blind or low vision, we added a letter-entry mode to enable easier entry of difficult words such as proper nouns. We conducted a longitudinal study with users who are legally blind to compare FlexType to users' typical text input methods. While we found FlexType was significantly slower than …


Creative Insights Into Motion: Enhancing Human Activity Understanding With 3d Data Visualization And Annotation, Isaac Browen, Hector M. Camarillo-Abad, Franceli L. Cibrian, Trudi Di Qi Jun 2024

Creative Insights Into Motion: Enhancing Human Activity Understanding With 3d Data Visualization And Annotation, Isaac Browen, Hector M. Camarillo-Abad, Franceli L. Cibrian, Trudi Di Qi

Engineering Faculty Articles and Research

This paper presents a novel 3D system for human motion analysis - Motion Data Visualization and Annotation (MoViAn). Designed to provide a comprehensive visual representation of 3D human motion data, MoViAn incorporates detailed visualization of gaze direction, hand movements, and object interactions, alongside an interactive interface for efficient data annotation. A user study involving eight participants indicates that MoViAn enables users to thoroughly explore and annotate human motion data, with System Usability Scale (SUS) results demonstrating a satisfactory usability level. The contribution of this paper lies in the development of an interactive and usable data analytics tool aimed at deepening …


A Simple Mobile Plausibly Deniable System Using Image Steganography And Secure Hardware, Lichen Xia, Jinghui Liao, Niusen Chen, Bo Chen, Weisong Shi Jun 2024

A Simple Mobile Plausibly Deniable System Using Image Steganography And Secure Hardware, Lichen Xia, Jinghui Liao, Niusen Chen, Bo Chen, Weisong Shi

Michigan Tech Publications, Part 2

Traditional encryption methods cannot defend against coercive attacks in which the adversary captures both the user and the possessed computing device, and forces the user to disclose the decryption keys. Plausibly deniable encryption (PDE) has been designed to defend against this strong coercive attacker. At its core, PDE allows the victim to plausibly deny the very existence of hidden sensitive data and the corresponding decryption keys upon being coerced. Designing an efficient PDE system for a mobile platform, however, is challenging due to various design constraints bound to the mobile systems. Leveraging image steganography and the built-in hardware security feature …


Building Engineering Ecology For Industrial Change In Digital Age, Zhengzhong Xu, Jian Chan Jun 2024

Building Engineering Ecology For Industrial Change In Digital Age, Zhengzhong Xu, Jian Chan

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the digital civilization era, scientific and technological innovation has emerged as a crucial pathway to unleash new quality productive forces and spearhead the ascendancy of great powers. It has become a vital pillar for major nations to engage in international competition and reshape the global order. Furthermore, it acts as a key instrument to smooth out economic cycles and overcome the limitations imposed by these cycles. The rise model, marked by advanced scientific and technological innovation and a commitment to scientific self-sufficiency and enhancement, significantly boosts the viability and acceptance of China’s approach to international governance. At the same …


Comparative Analysis And Insights Into R&D Mode Of Top Artificial Intelligence Companies In China And The Us, Xiyi Yang, Jia Jia, Xiaoyu Zhou, Shouyang Wang Jun 2024

Comparative Analysis And Insights Into R&D Mode Of Top Artificial Intelligence Companies In China And The Us, Xiyi Yang, Jia Jia, Xiaoyu Zhou, Shouyang Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Artificial intelligence (AI) is currently one of the most prominent fields in the technology industry, with China and the US being two global centers for AI research and development. However, the two countries differ in their development levels of the AI industry. In particular, the emergence of ChatGPT in 2022 has sparked extensive discussions regarding the capabilities and competitiveness of Chinese AI companies. This study analyzes over 120 000 AI invention patents approved in the past five years in both China and the US. Firstly, it constructs a multidimensional index based on AI patent features to identify the top 10 …


Do You Say Please Or Thank You To Chatgpt? The Subtle Influence Of Prompt Engineering On Digital Civility, Essraa Nawar Jun 2024

Do You Say Please Or Thank You To Chatgpt? The Subtle Influence Of Prompt Engineering On Digital Civility, Essraa Nawar

Library Articles and Research

"

In the dynamic and rapidly evolving landscape of artificial intelligence, tools like ChatGPT have become integral to our daily digital interactions. These advanced AI systems assist us with a myriad of tasks, from generating text and answering complex questions to providing creative solutions. However, as we engage more frequently with these non-human entities, an intriguing question arises: Are we inadvertently becoming ruder in our digital communications, or are we consciously maintaining our ingrained habits of politeness?"


A Pathway For Digital Economy To Enable The Development Of Low-Carbon Transition Under “Technology-Organization-Environment” Framework, Wendong Wei, Yang Sun, Bei Liu, Hui Wang, Yong Geng Jun 2024

A Pathway For Digital Economy To Enable The Development Of Low-Carbon Transition Under “Technology-Organization-Environment” Framework, Wendong Wei, Yang Sun, Bei Liu, Hui Wang, Yong Geng

Bulletin of Chinese Academy of Sciences (Chinese Version)

The booming development of the digital economy has provided robust technical, management, and institutional means for the in-depth promotion of low-carbon transition. However, at present, there are still problems, such as the limited level of digital technological innovation, the insufficient supply of digital talents, and the urgent need for a sound digital governance system, which constrains the empowering effect of the digital economy on the development of China’s low-carbon transition. Based on the Technology-Organization-Environment (TOE) framework, this study discusses the technology iteration, management transform, and system optimization of the influence of digital economy on the development of low carbon transformation. …


Accelerated Particle Swarm Optimization Algorithm For Efficient Cluster Head Selection In Wsn, Imtiaz Ahmad, Tariq Hussain, Babar Shah, Altaf Hussain, Iqtidar Ali, Farman Ali Jun 2024

Accelerated Particle Swarm Optimization Algorithm For Efficient Cluster Head Selection In Wsn, Imtiaz Ahmad, Tariq Hussain, Babar Shah, Altaf Hussain, Iqtidar Ali, Farman Ali

All Works

Numerous wireless networks have emerged that can be used for short communication ranges where the infrastructure-based networks may fail because of their installation and cost. One of them is a sensor network with embedded sensors working as the primary nodes, termed Wireless Sensor Networks (WSNs), in which numerous sensors are connected to at least one Base Station (BS). These sensors gather information from the environment and transmit it to a BS or gathering location. WSNs have several challenges, including throughput, energy usage, and network lifetime concerns. Different strategies have been applied to get over these restrictions. Clustering may, therefore, be …


Digital Technologies Empower Innovative Development Governance Of The Yellow River Basin, Tara Qian Sun, Yingying Jia, Gaozuo Sun, Xixi Zhao, Rongping Mu Jun 2024

Digital Technologies Empower Innovative Development Governance Of The Yellow River Basin, Tara Qian Sun, Yingying Jia, Gaozuo Sun, Xixi Zhao, Rongping Mu

Bulletin of Chinese Academy of Sciences (Chinese Version)

The application of digital technologies is the core driving force for innovating traditional development and realizing a leap in productivity. The innovative development governance of the Yellow River Basin is a complex social system, involving economic, social, and ecological aspects. Its key driving force is the profound influence of digital technologies. Focused on how digital technologies empower the innovative development governance of the Yellow River Basin, the development process, problems, and challenges are analyzed at different stages, from the digital Yellow River to the digital twin Yellow River. It is found that the governance of the Yellow River Basin still …


Study On Data Mining Of Hydrogen Energy Policy In China Based On Natural Language Processing Technology, Dongling Huang, Yuan Liu, Xiaoshuai Yuan, Guozhong Jin, Yuanhang Cai, Li Liu, Heng Cao, Wanjun Li, Rui Cai Jun 2024

Study On Data Mining Of Hydrogen Energy Policy In China Based On Natural Language Processing Technology, Dongling Huang, Yuan Liu, Xiaoshuai Yuan, Guozhong Jin, Yuanhang Cai, Li Liu, Heng Cao, Wanjun Li, Rui Cai

Bulletin of Chinese Academy of Sciences (Chinese Version)

Report to the 20th National Congress of the CPC emphasized the importance of “working actively and prudently towards the goals of reaching peak carbon emissions and carbon neutrality”, as well as “speeding up the planning and development of a system for new energy sources”. As a green and low-carbon secondary energy source, hydrogen energy has multiple applications in promoting the large-scale and efficient use of renewable energy as well as energy substitution in the field of transportation. It can also accelerate decarbonization in industry, and as such, is an indispensable part of building a new energy system, reaching peak carbon …