Numerical simulation has been performed to improve the performance of Cu2ZnSnS4 (CZTS) solar cells by replacing CdS with Zn1–xSnxO buffer layer. The influences of thickness, donor concentration and defect density of buffer layers on the performance of CZTS solar cells were investigated. It has been found that Zn1–xSnxO buffer layer for Sn content of 0.20 is better for CZTS solar cell. A higher efficiency can be achieved with thinner buffer layer. The optimized solar cell demonstrated a maximum power conversion efficiency of 13%. 相似文献
In this work, chaos game optimization (CGO), a robust optimization approach, is employed for efficient design of a novel cascade controller for four test systems with interconnected power systems (IPSs) to tackle load–frequency control (LFC) difficulties. The CGO method is based on chaos theory principles, in which the structure of fractals is seen via the chaotic game principle and the fractals’ self-similarity characteristics are considered. CGO is applied in LFC studies as a novel application, which reveals further research gaps to be filled. For practical implementation, it is also highly desirable to keep the controller structure simple. Accordingly, in this paper, a CGO-based controller of fractional-order (FO) proportional–integral–derivative–FO proportional–integral (FOPID–FOPI) controller is proposed, and the integral time multiplied absolute error performance function is used. Initially, the proposed CGO-based FOPID–FOPI controller is tested with and without the nonlinearity of the governor dead band for a two-area two-source model of a non-reheat unit. This is a common test system in the literature. A two-area multi-unit system with reheater–hydro–gas in both areas is implemented. To further generalize the advantages of the proposed scheme, a model of a three-area hydrothermal IPS including generation rate constraint nonlinearity is employed. For each test system, comparisons with relevant existing studies are performed. These demonstrate the superiority of the proposed scheme in reducing settling time, and frequency and tie-line power deviations. 相似文献
Identity management is based on the creation and management of user identities for granting access to the cloud resources based on the user attributes. The cloud identity and access management (IAM) grants the authorization to the end-users to perform different actions on the specified cloud resources. The authorizations in the IAM are grouped into roles instead of granting them directly to the end-users. Due to the multiplicity of cloud locations where data resides and due to the lack of a centralized user authority for granting or denying cloud user requests, there must be several security strategies and models to overcome these issues. Another major concern in IAM services is the excessive or the lack of access level to different users with previously granted authorizations. This paper proposes a comprehensive review of security services and threats. Based on the presented services and threats, advanced frameworks for IAM that provide authentication mechanisms in public and private cloud platforms. A threat model has been applied to validate the proposed authentication frameworks with different security threats. The proposed models proved high efficiency in protecting cloud platforms from insider attacks, single sign-on failure, brute force attacks, denial of service, user privacy threats, and data privacy threats. 相似文献
Background removal of an identity (ID) picture consists in separating the foreground (face, body, hair and clothes) from the background of the image. It is a necessary groundwork for all modern identity documents that also has many benefits for improving ID security. State of the art image processing techniques encountered several segmentation issues and offer only partial solutions. It is due to the presence of erratic components like hairs, poor contrast, luminosity variation, shadow, color overlap between clothes and background. In this paper, a knowledge infused approach is proposed that hybridizes smart image processing tasks and prior knowledge. The research is based on a divide and conquer strategy aiming at simulating the sequential attention of human when performing a manual segmentation. Knowledge is infused by considering the spatial relation between anatomic elements of the ID image (face feature, forehead, body and hair) as well as their “signal properties”. The process consists in first determining a convex hull around the person’s body including all the foreground while keeping very close to the contour between the background and the foreground. Then, a body map generated from biometric analysis associated to an automatic grab cut process is applied to reach a finer segmentation. Finally, a heuristic-based post-processing step consisting in correcting potential hair and fine boundary issues leads to the final segmentation. Experimental results show that the newly proposed architecture achieves better performances than tested current state-of-the-art methodologies including active contours, generalist popular deep learning techniques, and also two other ones considered as the smartest for portrait segmentation. This new technology has been adopted by an international company as its industrial ID foreground solution.
In this work, acrylic acid (AAc) monomer was grafted onto low-density polyethylene (LDPE) films by the direct method to obtain acid (LDPE-grafted poly(acrylic acid) (LDPE-g-PAAc)) graft copolymers. The presence of the grafted PAAc with COOH groups allows coupling with Fe2+/3+ ions. The stabilization of Fe3O4 particles onto the graft copolymers was done by in situ reduction of LDPE-g-PAAc/Fe2+/3+ with sodium borohydride (NaBH4) in aqueous solution. The LDPE-g-PAAc graft copolymer and LDPE-g-PAAc/Fe3O4 composite films were characterized by scanning electron microscopy (SEM), X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FT-IR), differential scanning calorimetry (DSC), and electron spin resonance (ESR). The synthesized composites exhibit excellent magnetic properties. The results indicated that the magnetic oxide (Fe3O4) was embedded and homogenously dispersed into the surfaces of the graft copolymer films as indicated by SEM. The FT-IR analysis clearly suggests that an AAc monomer was effectively grafted onto LDPE. The XRD studies elucidate the change in the crystallinity of the graft copolymers.
In this paper, the problem of scheduling with agreements (SWA) is considered. In scheduling, this consists of a set of jobs non-preemptively on identical machines subject to constraints that only some specific jobs can be scheduled concurrently on different machines. These constraints are given by an agreement graph and the aim is to minimise the makespan. In the case of two machines we extend two NP-hardness results of SWA with processing times at most three that hold for bipartite agreement graphs to more general agreement graphs. Complexity results of SWA are established in the case of split and complement of bipartite graphs. We also present some approximation results for SWA. 相似文献
This article proposes to solve the problem of minimizing the total completion time in a two-machine permutation flowshop environment in which time delays between the machines are considered. For this purpose, an enumeration algorithm based on the branch-and-bound framework is developed, which includes new lower and upper bounds as well as dominance rules. The computational study shows that problems with up to 40 jobs can be solved in a reasonable amount of time. 相似文献
With the rapid development of emerging 5G and beyond (B5G), Unmanned Aerial Vehicles (UAVs) are increasingly important to improve the performance of dense cellular networks. As a conventional metric, coverage probability has been widely studied in communication systems due to the increasing density of users and complexity of the heterogeneous environment. In recent years, stochastic geometry has attracted more attention as a mathematical tool for modeling mobile network systems. In this paper, an analytical approach to the coverage probability analysis of UAV-assisted cellular networks with imperfect beam alignment has been proposed. An assumption was considered that all users are distributed according to Poisson Cluster Process (PCP) around base stations, in particular, Thomas Cluster Process (TCP). Using this model, the impact of beam alignment errors on the coverage probability was investigated. Initially, the Probability Density Function (PDF) of directional antenna gain between the user and its serving base station was obtained. Then, association probability with each tier was achieved. A tractable expression was derived for coverage probability in both Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) condition links. Numerical results demonstrated that at low UAVs altitude, beam alignment errors significantly degrade coverage performance. Moreover, for a small cluster size, alignment errors do not necessarily affect the coverage performance. 相似文献