期刊文献+
共找到137,104篇文章
< 1 2 250 >
每页显示 20 50 100
Research on TD-LTE Key Techniques
1
《China Communications》 SCIE CSCD 2008年第3期85-85,共1页
TD-LTE is the evolution system of TD-SCDMA system. Early in 2004 3GPP put forward the "Long Term Evolution" project based on the OFDM/FDMA core physical techniques with high qualities. While China Mobile and... TD-LTE is the evolution system of TD-SCDMA system. Early in 2004 3GPP put forward the "Long Term Evolution" project based on the OFDM/FDMA core physical techniques with high qualities. While China Mobile and several operators and vendors, both domestic and foreign, 展开更多
关键词 LTE TD Research on TD-LTE key techniques
下载PDF
Experimental Study on Key Techniques for Indoor Cultivation of Sprout Vegetables in Families
2
作者 Hongxia ZHANG Li FENG +4 位作者 Yanyan TENG Mingli YU Yiwei MA Zhuqi ZHANG Yuyan WANG 《Medicinal Plant》 CAS 2021年第3期36-38,共3页
This paper introduced the advantages of planting sprout vegetables in family rooms,expounded assembly principle of indoor cultivating device and the key techniques for indoor cultivating sprout vegetables in families.... This paper introduced the advantages of planting sprout vegetables in family rooms,expounded assembly principle of indoor cultivating device and the key techniques for indoor cultivating sprout vegetables in families.In the experiment,we assembled a set of indoor cultivating device for sprout vegetables,and summarized the indoor cultivating techniques of sprout vegetables in families.The indoor planting device was suitable for family members to cultivate sprout vegetables in the living rooms,kitchen,balcony and other corner space by using their spare time.It could not only provide high-quality vegetables for families,but also beautify the indoor environments of family rooms,and increase the oxygen content in rooms.This set of indoor cultivating device and techniques was suitable for planting various sprout vegetables(e.g.radish seedling,water spinach seedling,pea seedling,pine willow seedling,sunflower seedling and various bean seedlings,etc.).This is a set of high-efficient spatial planting technique in families,and also an effective way to increase organic vegetable supply for family. 展开更多
关键词 Sprout vegetables Organic vegetables Advantages key techniques Indoor planting Indoor cultivating device FAMILY
下载PDF
Review and Analysis of Key Techniques in Marine Sediment Sampling 被引量:2
3
作者 Shudong He Youduo Peng +2 位作者 Yongping Jin Buyan Wan Guangping Liu 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2020年第5期150-166,共17页
Deep-sea sediment is extremely important in marine scientific research,such as that concerning marine geology and microbial communities.The research findings are closely related to the in-situ information of the sedim... Deep-sea sediment is extremely important in marine scientific research,such as that concerning marine geology and microbial communities.The research findings are closely related to the in-situ information of the sediment.One prerequisite for investigations of deep-sea sediment is providing sampling techniques capable of preventing distortion during recovery.As the fruit of such sampling techniques,samplers designed for obtaining sediment have become indispensable equipment,owing to their low cost,light weight,compactness,easy operation,and high adaptability to sea conditions.This paper introduces the research and application of typical deep-sea sediment samplers.Then,a representative sampler recently developed in China is analyzed.On this basis,a review and analysis is conducted regarding the key techniques of various deep-sea sediment samplers,including sealing,pressure and temperature retaining,low-disturbance sampling,and no-pressure drop transfer.Then,the shortcomings in the key techniques for deep-sea sediment sampling are identified.Finally,prospects for the future development of key techniques for deep-sea sediment sampling are proposed,from the perspectives of structural diversification,functional integration,intelligent operation,and high-fidelity samples.This paper summarizes the existing samplers in the context of the key techniques mentioned above,and can provide reference for the optimized design of samplers and development of key sampling techniques. 展开更多
关键词 SAMPLER Sealing technique Pressure&temperature-retaining technique Low-disturbance sampling technique No-pressure drop transfer technique
下载PDF
Study on Key Techniques for Precise and Quantitative, Stable and High Yield Cultivation of Peanuts in Eastern Henan Region
4
作者 Ruhong FU Jihua WU 《Agricultural Biotechnology》 CAS 2019年第2期94-95,103,共3页
Peanut is a main industrial crop in the eastern Henan region. Its benefits directly affect the economic income of local farmers. Therefore, scientific cultivation of peanuts is an important way to increase farmers'... Peanut is a main industrial crop in the eastern Henan region. Its benefits directly affect the economic income of local farmers. Therefore, scientific cultivation of peanuts is an important way to increase farmers' income in the eastern Henan region. This paper firstly introduced the key techniques for precise and quantitative, stable and high yield cultivation of peanuts in the eastern Henan region. From the field selection, scientific seed selection, precise quantitative sowing, fertilizer and water management, chemical control technologies, prevention and control of pests and diseases, and timely harvesting, it made an in-depth analysis. It is expected to provide data references for further improvement of stale and high yield cultivation technical system, and provide technical guidance for raising the peanut planting level of peanut growers. 展开更多
关键词 PEANUT High yield CULTIVATION technique Yingquan DISTRICT
下载PDF
Key Techniques of Cultivation of Stropharia rugosoannulata
5
作者 Senlin ZHU Qinyu ZHANG +2 位作者 Bo CHEN Xiaomin WANG Bangxi ZHANG 《Asian Agricultural Research》 2022年第5期41-44,共4页
Stropharia rugosoannulata is a straw rotting edible fungus that has developed rapidly in recent years.In the process of cultivation,key technologies have a huge impact on its yield.The key techniques for the cultivati... Stropharia rugosoannulata is a straw rotting edible fungus that has developed rapidly in recent years.In the process of cultivation,key technologies have a huge impact on its yield.The key techniques for the cultivation conditions and modes of S.rugosoannulata were summerized to promote the realization of stable and high yield of S.rugosoannulata. 展开更多
关键词 Stropharia rugosoannulata Cultivation conditions Cultivation mode Cultivation techniques
下载PDF
Study on key techniques on ecological renovation design of existing buildings in China 被引量:1
6
作者 Wu Jinxiu Zhang Hui Dong Wei Sun Ruyan 《Engineering Sciences》 EI 2010年第2期44-48,55,共6页
With the rapid development of China economy and critical ecological situation in China,ecological renovation of existing buildings has become a special important topic. Key techniques on ecological renovation design o... With the rapid development of China economy and critical ecological situation in China,ecological renovation of existing buildings has become a special important topic. Key techniques on ecological renovation design of existing buildings in China are explored in this paper. Special attention is paid to specific treatments suitable for China. 展开更多
关键词 中国经济 生态状况 改造设计 建筑 技术 更新设计
下载PDF
A new quantum key distribution resource allocation and routing optimization scheme
7
作者 毕琳 袁晓同 +1 位作者 吴炜杰 林升熙 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期244-259,共16页
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env... Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others. 展开更多
关键词 quantum key distribution(QKD) resource allocation key storage routing algorithm
原文传递
Modelling Key Population Attrition in the HIV and AIDS Programme in Kenya Using Random Survival Forests with Synthetic Minority Oversampling Technique-Nominal Continuous
8
作者 Evan Kahacho Charity Wamwea +1 位作者 Bonface Malenje Gordon Aomo 《Journal of Data Analysis and Information Processing》 2023年第1期11-36,共26页
HIV and AIDS has continued to be a major public health concern, and hence one of the epidemics that the world resolved to end by 2030 as highlighted in sustainable development goals (SDGs). A colossal amount of effort... HIV and AIDS has continued to be a major public health concern, and hence one of the epidemics that the world resolved to end by 2030 as highlighted in sustainable development goals (SDGs). A colossal amount of effort has been taken to reduce new HIV infections, but there are still a significant number of new infections reported. HIV prevalence is more skewed towards the key population who include female sex workers (FSW), men who have sex with men (MSM), and people who inject drugs (PWID). The study design was retrospective and focused on key population enrolled in a comprehensive HIV and AIDS programme by the Kenya Red Cross Society from July 2019 to June 2021. Individuals who were either lost to follow up, defaulted (dropped out, transferred out, or relocated) or died were classified as attrition;while those who were active and alive by the end of the study were classified as retention. The study used density analysis to determine the spatial differences of key population attrition in the 19 targeted counties, and used Kilifi county as an example to map attrition cases in smaller administrative areas (sub-county level). The study used synthetic minority oversampling technique-nominal continuous (SMOTE-NC) to balance the datasets since the cases of attrition were much less than retention. The random survival forests model was then fitted to the balanced dataset. The model correctly identified attrition cases using the predicted ensemble mortality and their survival time using the estimated Kaplan-Meier survival function. The predictive performance of the model was strong and way better than random chance with concordance indices greater than 0.75. 展开更多
关键词 Random Survival Forests Synthetic Minority Oversampling technique-Nominal Continuous (SMOTE-NC) key Population Female Sex Workers (FSW) Men Who Have Sex with Men (MSM) People Who Inject Drugs (PWID)
下载PDF
Improved decoy-state quantum key distribution with uncharacterized heralded single-photon sources
9
作者 徐乐辰 张春辉 +1 位作者 周星宇 王琴 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期204-208,共5页
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi... Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources. 展开更多
关键词 quantum key distribution heralded single-photon source decoy-state method
原文传递
Epileptic brain network mechanisms and neuroimaging techniques for the brain network
10
作者 Yi Guo Zhonghua Lin +1 位作者 Zhen Fan Xin Tian 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第12期2637-2648,共12页
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d... Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions. 展开更多
关键词 electrophysiological techniques EPILEPSY functional brain network functional magnetic resonance imaging functional near-infrared spectroscopy machine leaning molecular imaging neuroimaging techniques structural brain network virtual epileptic models
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
11
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces
12
作者 Sheetal Sharma Kamali Gupta +2 位作者 DeepaliGupta Shalli Rani Gaurav Dhiman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2029-2059,共31页
The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness... The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making themmore intelligent and connected. However, this advancement comes with challenges related to the effectiveness ofIoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensuretheir proper functionality. The success of smart systems relies on their seamless operation and ability to handlefaults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore,sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments.To address these concerns, various techniques and algorithms can be employed to enhance the performance ofIoT devices through effective fault detection. This paper conducted a thorough review of the existing literature andconducted a detailed analysis.This analysis effectively links sensor errors with a prominent fault detection techniquecapable of addressing them. This study is innovative because it paves theway for future researchers to explore errorsthat have not yet been tackled by existing fault detection methods. Significant, the paper, also highlights essentialfactors for selecting and adopting fault detection techniques, as well as the characteristics of datasets and theircorresponding recommended techniques. Additionally, the paper presents amethodical overview of fault detectiontechniques employed in smart devices, including themetrics used for evaluation. Furthermore, the paper examinesthe body of academic work related to sensor faults and fault detection techniques within the domain. This reflectsthe growing inclination and scholarly attention of researchers and academicians toward strategies for fault detectionwithin the realm of the Internet of Things. 展开更多
关键词 ERROR fault detection techniques sensor faults OUTLIERS Internet of Things
下载PDF
Countermeasure against blinding attack for single-photon detectors in quantum key distribution
13
作者 Lianjun Jiang Dongdong Li +12 位作者 Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang 《Journal of Semiconductors》 EI CAS CSCD 2024年第4期76-81,共6页
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin... Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security. 展开更多
关键词 quantum key distribution single photon detector blinding attack pulsed blinding attack COUNTERMEASURE quan-tum communication
下载PDF
Comparison of prognosis and postoperative morbidities between standard pancreaticoduodenectomy and the TRIANGLE technique for resectable pancreatic ductal adenocarcinoma
14
作者 He-Xing Hang Zheng-Hua Cai +3 位作者 Yi-Fei Yang Xu Fu Yu-Dong Qiu Hao Cheng 《World Journal of Gastrointestinal Surgery》 SCIE 2024年第3期689-699,共11页
BACKGROUND Radical surgery combined with systemic chemotherapy offers the possibility of long-term survival or even cure for patients with pancreatic ductal adenocar-cinoma(PDAC),although tumor recurrence,especially l... BACKGROUND Radical surgery combined with systemic chemotherapy offers the possibility of long-term survival or even cure for patients with pancreatic ductal adenocar-cinoma(PDAC),although tumor recurrence,especially locally,still inhibits the treatment efficacy.The TRIANGLE technique was introduced as an extended dissection procedure to improve the R0 resection rate of borderline resectable or locally advanced PDAC.However,there was a lack of studies concerning postoperative complications and long-term outcomes of this procedure on patients with resectable PDAC.PDAC.METHODS Patients with resectable PDAC eligible for PD from our hospital between June 2018 and December 2021 were enrolled in this retrospective cohort study.All the patients were divided into PDstandard and PDTRIANGLE groups according to the surgical procedure.Baseline characteristics,surgical data,and postoperative morbidities were recorded.All of the patients were followed up,and the date and location of tumor recurrence,and death were recorded.The Kaplan-Meier method and log-rank test were used for the survival analysis.RESULTS There were 93 patients included in the study and 37 underwent the TRIANGLE technique.Duration of operation was longer in the PDTRIANGLE group compared with the PDstandard group[440(410-480)min vs 320(265-427)min](P=0.001).Intraoperative blood loss[700(500-1200)mL vs 500(300-800)mL](P=0.009)and blood transfusion[975(0-1250)mL vs 400(0-800)mL](P=0.009)were higher in the PDTRIANGLE group.There was a higher incidence of surgical site infection(43.2%vs 12.5%)(P=0.001)and postoperative diarrhea(54.1%vs 12.5%)(P=0.001)in the PDTRIANGLE group.The rates of R0 resection and local recurrence,overall survival,and disease-free survival did not differ significantly between the two groups.CONCLUSION The TRIANGLE technique is safe,with acceptable postoperative morbidities compared with standardized PD,but it does not improve prognosis for patients with resectable PDAC. 展开更多
关键词 Pancreatic ductal adenocarcinoma TRIANGLE technique PANCREATICODUODENECTOMY PROGNOSIS Postoperative morbidities
下载PDF
Treatment of bilateral developmental dysplasia of the hip joint with an improved technique:A case report
15
作者 Xing-Xing Yu Jian-Ye Chen +3 位作者 Hong-Sheng Zhan Ming-Da Liu Yun-Fei Li Yu-Yan Jia 《World Journal of Clinical Cases》 SCIE 2024年第7期1320-1325,共6页
BACKGROUND Developmental dysplasia of the hip(DDH)is a common osteoarticular deformity in pediatric orthopedics.A patient with bilateral DDH was diagnosed and treated using our improved technique"(powerful overtu... BACKGROUND Developmental dysplasia of the hip(DDH)is a common osteoarticular deformity in pediatric orthopedics.A patient with bilateral DDH was diagnosed and treated using our improved technique"(powerful overturning acetabuloplasty)"combined with femoral rotational shortening osteotomy.CASE SUMMARY A 4-year-old girl who was diagnosed with bilateral DDH could not stand normally,and sought surgical treatment to solve the problem of double hip extension and standing.As this child had high dislocation of the hip joint and the acetabular index was high,we changed the traditional acetabuloplasty to"powerful turnover acetabuloplasty"combined with femoral rotation shortening osteotomy.During the short-term postoperative follow-up(1,3,6,9,12,and 15 months),the child had no discomfort in her lower limbs.After the braces and internal fixation plates were removed,formal rehabilitation training was actively carried out.CONCLUSION Our"powerful overturning acetabuloplasty"combined with femoral rotational shortening osteotomy is feasible in the treatment of DDH in children.This technology may be widely used in the clinic. 展开更多
关键词 Developmental dysplasia of the hip Improved technique Case report
下载PDF
Research Progress on Detection Techniques of Fungicide Residues in Chinese Chives
16
作者 Xiuying CHEN Zhe MENG +5 位作者 Chen DING Huihui LIU Yancheng ZHOU Jinlu LI Yanhua YAN Lei WANG 《Agricultural Biotechnology》 2024年第1期43-48,共6页
Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized... Chinese chive is a kind of medicinal and edible plant,with many diseases,and chemical fungicides are usually used for control.In order to find out the risk of pesticide residues in Chinese chives,this paper summarized relevant literatures published in recent years,and sorted out and analyzed the types of pesticides used and detection techniques of common diseases in Chinese chives. 展开更多
关键词 Chinese chive Pesticide residues FUNGICIDE Detection technique
下载PDF
Prediction of high-embankment settlement combining joint denoising technique and enhanced GWO-v-SVR method
17
作者 Qi Zhang Qian Su +2 位作者 Zongyu Zhang Zhixing Deng De Chen 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2024年第1期317-332,共16页
Reliable long-term settlement prediction of a high embankment relates to mountain infrastructure safety.This study developed a novel hybrid model(NHM)that combines a joint denoising technique with an enhanced gray wol... Reliable long-term settlement prediction of a high embankment relates to mountain infrastructure safety.This study developed a novel hybrid model(NHM)that combines a joint denoising technique with an enhanced gray wolf optimizer(EGWO)-n-support vector regression(n-SVR)method.High-embankment field measurements were preprocessed using the joint denoising technique,which in-cludes complete ensemble empirical mode decomposition,singular value decomposition,and wavelet packet transform.Furthermore,high-embankment settlements were predicted using the EGWO-n-SVR method.In this method,the standard gray wolf optimizer(GWO)was improved to obtain the EGWO to better tune the n-SVR model hyperparameters.The proposed NHM was then tested in two case studies.Finally,the influences of the data division ratio and kernel function on the EGWO-n-SVR forecasting performance and prediction efficiency were investigated.The results indicate that the NHM suppresses noise and restores details in high-embankment field measurements.Simultaneously,the NHM out-performs other alternative prediction methods in prediction accuracy and robustness.This demonstrates that the proposed NHM is effective in predicting high-embankment settlements with noisy field mea-surements.Moreover,the appropriate data division ratio and kernel function for EGWO-n-SVR are 7:3 and radial basis function,respectively. 展开更多
关键词 High embankment Settlement prediction Joint denoising technique Enhanced gray wolf optimizer Support vector regression
下载PDF
Modified Black Widow Optimization-Based Enhanced Threshold Energy Detection Technique for Spectrum Sensing in Cognitive Radio Networks
18
作者 R.Saravanan R.Muthaiah A.Rajesh 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2339-2356,共18页
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second... This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques. 展开更多
关键词 Cognitive radio network spectrum sensing noise uncertainty modified black widow optimization algorithm energy detection technique
下载PDF
Economic Power Dispatching from Distributed Generations: Review of Optimization Techniques
19
作者 Paramjeet Kaur Krishna Teerth Chaturvedi Mohan Lal Kolhe 《Energy Engineering》 EI 2024年第3期557-579,共23页
In the increasingly decentralized energy environment,economical power dispatching from distributed generations(DGs)is crucial to minimizing operating costs,optimizing resource utilization,and guaranteeing a consistent... In the increasingly decentralized energy environment,economical power dispatching from distributed generations(DGs)is crucial to minimizing operating costs,optimizing resource utilization,and guaranteeing a consistent and sustainable supply of electricity.A comprehensive review of optimization techniques for economic power dispatching from distributed generations is imperative to identify the most effective strategies for minimizing operational costs while maintaining grid stability and sustainability.The choice of optimization technique for economic power dispatching from DGs depends on a number of factors,such as the size and complexity of the power system,the availability of computational resources,and the specific requirements of the application.Optimization techniques for economic power dispatching from distributed generations(DGs)can be classified into two main categories:(i)Classical optimization techniques,(ii)Heuristic optimization techniques.In classical optimization techniques,the linear programming(LP)model is one of the most popular optimization methods.Utilizing the LP model,power demand and network constraints are met while minimizing the overall cost of generating electricity from DGs.This approach is efficient in determining the best DGs dispatch and is capable of handling challenging optimization issues in the large-scale system including renewables.The quadratic programming(QP)model,a classical optimization technique,is a further popular optimization method,to consider non-linearity.The QP model can take into account the quadratic cost of energy production,with consideration constraints like network capacity,voltage,and frequency.The metaheuristic optimization techniques are also used for economic power dispatching from DGs,which include genetic algorithms(GA),particle swarm optimization(PSO),and ant colony optimization(ACO).Also,Some researchers are developing hybrid optimization techniques that combine elements of classical and heuristic optimization techniques with the incorporation of droop control,predictive control,and fuzzy-based methods.These methods can deal with large-scale systems with many objectives and non-linear,non-convex optimization issues.The most popular approaches are the LP and QP models,while more difficult problems are handled using metaheuristic optimization techniques.In summary,in order to increase efficiency,reduce costs,and ensure a consistent supply of electricity,optimization techniques are essential tools used in economic power dispatching from DGs. 展开更多
关键词 Economic power dispatching distributed generations decentralized energy cost minimization optimization techniques
下载PDF
The Impact of Model Based Offset Scaling Technique on the Amplitude Variation with Offset Responses from 3D Seismic Data Acquired from the Tano Basin, Offshore Ghana
20
作者 Striggner Bedu-Addo Sylvester Kojo Danuor Aboagye Menyeh 《International Journal of Geosciences》 CAS 2024年第1期40-53,共14页
Amplitudes have been found to be a function of incident angle and offset. Hence data required to test for amplitude variation with angle or offset needs to have its amplitudes for all offsets preserved and not stacked... Amplitudes have been found to be a function of incident angle and offset. Hence data required to test for amplitude variation with angle or offset needs to have its amplitudes for all offsets preserved and not stacked. Amplitude Variation with Offset (AVO)/Amplitude Variation with Angle (AVA) is necessary to account for information in the offset/angle parameter (mode converted S-wave and P-wave velocities). Since amplitudes are a function of the converted S- and P-waves, it is important to investigate the dependence of amplitudes on the elastic (P- and S-waves) parameters from the seismic data. By modelling these effects for different reservoir fluids via fluid substitution, various AVO geobody classes present along the well and in the entire seismic cube can be observed. AVO analysis was performed on one test well (Well_1) and 3D pre-stack angle gathers from the Tano Basin. The analysis involves creating a synthetic model to infer the effect of offset scaling techniques on amplitude responses in the Tano basin as compared to the effect of unscaled seismic data. The spectral balance process was performed to match the amplitude spectra of all angle stacks to that of the mid (26°) stack on the test lines. The process had an effect primarily on the far (34° - 40°) stacks. The frequency content of these stacks slightly increased to match that of the near and mid stacks. In offset scaling process, the root mean square (RMS) amplitude comparison between the synthetic and seismic suggests that the amplitude of the far traces should be reduced relative to the nears by up to 16%. However, the exact scaler values depend on the time window considered. This suggests that the amplitude scaling with offset delivered from seismic processing is only approximately correct and needs to be checked with well synthetics and adjusted accordingly prior to use for AVO studies. The AVO attribute volumes generated were better at resolving anomalies on spectrally balanced and offset scaled data than data delivered from conventional processing. A typical class II AVO anomaly is seen along the test well from the cross-plot analysis and AVO attribute cube which indicates an oil filled reservoir. 展开更多
关键词 Amplitude Variation with Offset (AVO) Model Based Offset Scaling technique Tano Basin
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部