Neural Computing and Applications - In this research article, a novel approach is proposed by considering the sine augmented scaled sine cosine (SAS-SCA) Algorithm for the load frequency control of... 相似文献
New experimental results on pressure loss for the single and two‐phase gas‐liquid flow with non‐Newtonian liquids in helical coils are reported. For a constant value of the curvature ratio, the value of the helix angle of the coils is varied from 2.56° to 9.37°. For single phase flow, the effect of helix angle on pressure loss is found to be negligible in laminar flow regime but pressure loss increases with the increasing value of helix angle in turbulent flow conditions. On the other hand, for the two‐phase flow, the well‐known Lockhart‐Martinelli method correlates the present results for all values of helix angle (2.56‐9.37°) satisfactorily under turbulent/laminar and turbulent/turbulent conditions over the following ranges of variables as: 0.57 ≤ n′ ≤ 1; Re′ < 4000; Rel < 4000; Reg < 8000; 8 ≤ x ≤ 1000 and 0.2 ≤ De′ ≤ 1000. 相似文献
The field of information systems (IS) remains ill-defined, facing problems of recognition and identity crisis. Several papers and debates have been dedicated on this topic for over three decades. The focus of these debates have largely centered on the state of the IS field in Americas and Europe and with a limited study conducted in the Asia–Pacific context. This study attempts to assess the field in the Indian context and highlight the challenges and issues faced by IS faculties in India. Based on literature survey of the seminal papers in the field, we identified the salient topics of interest to IS researchers: identity of the IS field; diversity of the field; research approaches, methods and rigor; reference disciplines; journals and conferences; and IS course and curriculum. A two-phase study was carried out to explore the interest generated by the IS field in India. In the first phase, secondary data review of leading business schools in India was carried out to understand their focus on IS as an academic discipline. In the second phase, we conducted interviews of IS researchers from the premium business schools in India. In our study, we analyze the research focus of IS faculties in B-schools in India, analyze the composition of the faculty pool and the nature of research work undertaken by them. Our study points at the restricted focus of IS researchers in India around a few narrow areas, with a significant breadth of topics not being explored for research. We found the identity struggle of the field to be prominent, which was further compounded by the limited number of active, IS researchers. The growing importance of qualitative techniques in IS research, the challenges of developing a sound base in multiple reference disciplines and the need for making IS course interesting for business school students were some of the other significant observations. Our study also highlighted the paradox of the success of the IT industry in India leading to reduced enrollment of IS courses in B-Schools. We conclude by providing recommendations to B-school deans and directors. 相似文献
Feasible clinical application of any automated segmenting methodology demands more than just accuracy. Amendment to the automated delineation is necessary when the algorithm fails, however, integrated solution to such a scenario is largely absent in literature. Hence in this survey we devised an architecture that does both the automated and interactive lung field localizations using a single segmenting engine—random walker algorithm—so that intuitive amendment is only necessary when the automated generated delineation is unsatisfactory. The algorithm proceeds by first extracting 18 intensity profiles running horizontally, each of them equally spacing apart, and in each intensity profile three extreme points denoting the two lungs and the esophagus are determined through profile matching. This done, the algorithm removes profiles that do not intersect with the lung, and the rest of the extreme points are plugged into random walker algorithm to perform segmentation. The achieved accuracy in localization by the above was 0.8875 in terms of overlap measure (the maximum value for this parameter is 1) over 341 images. In the case where unsatisfactory delineation prompts amendment necessary, the user can interactively segment the lung by just a shift on some of the previous-determined points to the desired locations, and random walker algorithm is run again with the amended input. By such a fusion, the benefits of both the automated and interactive segmentation are shared in a single architecture. 相似文献
We study entanglement dynamics of qubit–qutrit pair under Dzyaloshinskii–Moriya (DM) interaction. The qubit–qutrit pair acts as a closed system and one external qubit serve as the environment for the pair. The external qubit interact with qubit of closed system via DM interaction. This interaction frequently kills the entanglement between qubit–qutrit pair, which is also periodically recovered. On the other hand two parameter class of state of qubit–qutrit pair also affected by DM interaction and one parameter class of state remains unaffected. The frequency of occurrence of entanglement sudden death and entanglement sudden birth in two parameter class of state is half than qubit–qutrit pure state. We used our quantification of entanglement as negativity measure. 相似文献
This paper investigates the resource allocation in a massively deployed user cognitive radio enabled non-orthogonal multiple access (CR-NOMA) network considering the downlink scenario. The system performance deteriorates with the number of users who are experiencing similar channel characteristics from the base station (BS) in NOMA. To address this challenge, we propose a framework for maximizing the system throughput that is based on one-to-one matching game theory integrated with the machine learning technique. The proposed approach is decomposed to solve users clustering and power allocation subproblems. The selection of optimal cluster heads (CHs) and their associated cluster members is based on Gale-Shapley matching game theoretical model with the application of Hungarian method. The CHs can harvest energy from the BS and transfer their surplus power to the primary user (PU) through wireless power transfer. In return, they are allowed to access the licensed band for secondary transmission. The power allocation to the users intended for power conservation at CHs is formulated as a probabilistic constraint, which is then solved by employing the support vector machine (SVM) algorithm. The simulation results demonstrate the efficacy of our proposed schemes that enable the CHs to transfer the residual power while ensuring maximum system throughput. The effects of different parameters on the performance are also studied. 相似文献
The concept of cloud envisioned cyber-physical systems is a practical technology that allows users to interact with each other while transferring data in the cloud. In cyber-physical systems, cloud storage utilizes data deduplication techniques to improve the performance of its applications. However, this method exposes sensitive data and causes security risks. Various research related to cloud storage has been conducted. Despite the advantages of this technology, it lacks the necessary security features and high performance. In the proposed method, a victim's virtual computer is moved to the cloud without interfering with the other processes running on the network. It protects against the attacks caused by encrypting the data with a cryptographically binding hash. Post-Quantum Cryptographic techniques, such as lightweight Multi-Extractable Somewhere Statistically Binding and Learning With Error authenticate data sharing protocols (MESSB–LWE), have been used. These allow for safe data sharing across geographically scattered physical devices and clients with lightweight concepts. The numerical analysis of MESSB–LWE is carried out in different stages, and the results show that it has incredible performance and practicality when compared to the literature. Finally, the authors have explored a couple of factors that should be considered for future research work in authentication for securing remote systems in the cloud environment.