[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (18)

Search Parameters:
Keywords = control-flow statements

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 1368 KiB  
Systematic Review
Systematic Review of the Effective Integration of Storage Systems and Electric Vehicles in Microgrid Networks: Innovative Approaches for Energy Management
by Paul Arévalo, Danny Ochoa-Correa and Edisson Villa-Ávila
Vehicles 2024, 6(4), 2075-2105; https://doi.org/10.3390/vehicles6040102 - 3 Dec 2024
Viewed by 729
Abstract
The increasing demand for more efficient and sustainable power systems, driven by the integration of renewable energy, underscores the critical role of energy storage systems (ESS) and electric vehicles (EVs) in optimizing microgrid operations. This paper provides a systematic literature review, conducted in [...] Read more.
The increasing demand for more efficient and sustainable power systems, driven by the integration of renewable energy, underscores the critical role of energy storage systems (ESS) and electric vehicles (EVs) in optimizing microgrid operations. This paper provides a systematic literature review, conducted in accordance with the PRISMA 2020 Statement, focusing on studies published between 2014 and 2024 and sourced from Web of Science and Scopus, resulting in 97 selected works. The review highlights the potential of EVs, not only as sustainable transport solutions but also as mobile storage resources, enhancing microgrid flexibility and stability through vehicle-to-grid (V2G) systems. It also underscores the importance of advanced control strategies, such as Model Predictive Control (MPC) and hybrid AC/DC microgrids, for improving energy flow management and operational resilience. Despite these advancements, gaps remain in the comprehensive integration of ESS and EVs, particularly regarding interoperability between microgrid components and the lack of optimization frameworks that holistically address dynamic pricing, grid stability, and renewable energy integration. This paper synthesizes existing technologies and offers insights for future research aimed at advancing the sustainability, efficiency, and economic viability of microgrids. Full article
Show Figures

Figure 1

Figure 1
<p>Literature review methodology.</p>
Full article ">Figure 2
<p>Summary of the results from the screening phase.</p>
Full article ">Figure 3
<p>Matrix for verifying the eligibility and inclusion criteria during full-text evaluation.</p>
Full article ">Figure 4
<p>Bibliometric analysis of the selected articles.</p>
Full article ">Figure 5
<p>Word cloud map of keywords of the selected items.</p>
Full article ">Figure A1
<p>PRISMA methodology flowchart for the studies selection.</p>
Full article ">
17 pages, 795 KiB  
Review
Does Surgical Treatment for Benign Prostate Enlargement (BPE)-Related Bladder Outlet Obstruction (BOO) Benefit Patients with Central Nervous System Diseases? A Systematic Review
by Ioannis Charalampous, Ioannis Tsikopoulos, Calypso Mitkani, Michael Samarinas, Yuhong Yuan, Ioannis Vouros, Petros Tsafrakidis, Anastasiadis Anastasios, Anastasia Gkotsi and Vasileios Sakalis
J. Clin. Med. 2024, 13(19), 5846; https://doi.org/10.3390/jcm13195846 - 30 Sep 2024
Viewed by 1359
Abstract
Background/Objectives: Bladder outlet obstruction (BOO) resulting from benign prostate enlargement (BPE) is a common cause of lower urinary tract symptoms (LUTS) in men. Patients with central nervous system (CNS) diseases, such as spinal cord injury (SCI), Parkinson’s disease (PD), cerebrovascular accident (CVA) and [...] Read more.
Background/Objectives: Bladder outlet obstruction (BOO) resulting from benign prostate enlargement (BPE) is a common cause of lower urinary tract symptoms (LUTS) in men. Patients with central nervous system (CNS) diseases, such as spinal cord injury (SCI), Parkinson’s disease (PD), cerebrovascular accident (CVA) and multiple systemic atrophy (MSA), commonly experience lower urinary tract dysfunction. Men who suffer from CNS diseases may also experience symptoms related to BPE and BOO, which pose an additional burden to their overall clinical status and result in the need for catheter use and a deterioration in quality of life. The aim of this study was to identify if prostate surgery will benefit men with CNS diseases who have been diagnosed with BPE-related BOO. Methods: The systematic review was conducted according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) statement. EMBASE, MEDLINE, Cochrane systematic reviews, Cochrane Central Register of Controlled Trials, Google Scholar, and ClinicalTrials.gov were searched from 1946 up to July 2023 for peer-reviewed publications addressing the primary outcome (success rate) and the secondary outcomes (postoperative changes in incontinence episodes, urodynamic parameters, questionnaire scores, and quality of life). In addition, the perioperative outcomes (adverse events and the need for further medical or surgical therapy) were reported. Results: A total of 1572 abstracts were screened, and 13 studies involving 1144 patients were eligible for inclusion. Six studies assessed the effect of prostate surgery for BPE-related BOO in SCI, four studies in CVA, two studies in PD, and one study in the MSA population. All studies were considered to have a high risk of bias. Transurethral resection of the prostate (TURP) was the most common de-obstruction procedure, followed by prostatic artery embolism and open prostatectomy. The overall pooled success rate was calculated as 81.4% (65–100%) in SCI, 27.1% (9–70%) in PD, and 66.7% (50–79%) in CVA populations. The risk of de novo incontinence was 24.7–50% in SCI, 20% in PD, 21–50% in CVA, and 60% in MSA population. In patients with SCI with BPE-related BOO, prostate surgery improved mean bladder compliance and detrusor filling pressure and resolved detrusor overactivity in up to 50% of patients. Improvement of free flow rate, voided volume, and post-void residual was observed in all patients. Patients with CVA had an increased risk of perioperative mortality compared to non-CVA patients, and the risk of postoperative complications was inversely proportional to the timing of the CVA insult since surgery. Conclusions: This systematic review provides an overview of the available evidence on the outcome of prostate surgery in patients with neurologic diseases and BPE-related BOO. Identifying the optimal practice was challenging due to the limited availability of high-quality studies and the high variability of the reported outcomes. Properly selected patients with neurological diseases may benefit from prostate surgery, provided that preoperative investigations indicate BPE-related BOO. Full article
(This article belongs to the Section Nephrology & Urology)
Show Figures

Figure 1

Figure 1
<p>The PRISMA flow diagram of the study.</p>
Full article ">Figure 2
<p>Risk of bias summary.</p>
Full article ">Figure 3
<p>Risk of bias graph.</p>
Full article ">
14 pages, 6538 KiB  
Article
Extension of a Contact Subroutine for Composite Ring Rolling to Include Temperature Dependency
by Laurenz Kluge, Stefan Stergianou, Moritz Gouverneur and David Bailly
J. Manuf. Mater. Process. 2024, 8(4), 178; https://doi.org/10.3390/jmmp8040178 - 16 Aug 2024
Viewed by 999
Abstract
By combining the ring rolling and roll bonding processes, the product spectrum can be additionally expanded. Since a successful composite ring rolling process requires a higher growth tendency for the inner ring, previous publications commonly included a softer inner ring to reduce the [...] Read more.
By combining the ring rolling and roll bonding processes, the product spectrum can be additionally expanded. Since a successful composite ring rolling process requires a higher growth tendency for the inner ring, previous publications commonly included a softer inner ring to reduce the flow resistance of the inner ring or specific geometries for rings and tools. In this work, the material combination of a 100Cr6 (DIN 1.3505, AISI 52100) outer ring and a 42CrMo4 (DIN 1.7225, AISI 4140) inner ring is used to show that the composite ring rolling process is also possible for material combinations with a balanced flow stress ratio and equal wall thicknesses. In earlier publications, the influence of temperature was neglected. As the influence on the yield stress and thus on the success of the process has a significant influence, this should be considered in order to be able to make a reliable statement. For this purpose, the bond formation of the two materials was investigated by bonding experiments, and an existing bond formation model was extended with respect to the temperature dependency. On the basis of this model, the process control parameters were investigated using FE simulations, and a ring rolling experiment was carried out. Full article
Show Figures

Figure 1

Figure 1
<p>Evolution of the specimen (<b>left</b>) and setup of the experiment (<b>right</b>).</p>
Full article ">Figure 2
<p>Bond strength in dependence of the surface enlargement (SE) at T = 1150 °C.</p>
Full article ">Figure 3
<p>Gradient of the bond strength in area 2 against the temperature.</p>
Full article ">Figure 4
<p>Comparison of the bond strength of the simulation and the experiments.</p>
Full article ">Figure 5
<p>Simulation of composite ring rolling.</p>
Full article ">Figure 6
<p>Cross-section of the ring in the axial roll gap after (<b>a</b>) 0, (<b>b</b>) 3, and (<b>c</b>) 15 s of process time for the simulation without the subroutine VUINTER.</p>
Full article ">Figure 7
<p>Cross-section of the ring in the axial roll gap after (<b>a</b>) 0, (<b>b</b>) 3, and (<b>c</b>) 15 s of process time for the simulation including the subroutine VUINTER.</p>
Full article ">Figure 8
<p>Ring rolling mill of the IBF, type RAW H100/V80.</p>
Full article ">Figure 9
<p>(<b>a</b>) Composite ring, final outer diameter is 523 mm; (<b>b</b>) cutting surface of the ring.</p>
Full article ">
28 pages, 12666 KiB  
Article
Enhancing Traffic Sustainability: An Analysis of Isolation Intersection Effectiveness through Fixed Time and Logic Control Design Using VisVAP Algorithm
by Ramadan Duraku and Diellza Boshnjaku
Sustainability 2024, 16(7), 2930; https://doi.org/10.3390/su16072930 - 1 Apr 2024
Viewed by 1166
Abstract
This paper addresses the limitations of the fixed-time approach in traffic signal control, which can lead to bottlenecks and inefficiencies. Proposing an alternative algorithm based on design logic control, the study integrates data from inductive detectors and non-linear traffic flow rates to optimize [...] Read more.
This paper addresses the limitations of the fixed-time approach in traffic signal control, which can lead to bottlenecks and inefficiencies. Proposing an alternative algorithm based on design logic control, the study integrates data from inductive detectors and non-linear traffic flow rates to optimize signaling plans. Analytical models are developed for both fixed and semi-actuated traffic signal control approaches, with PTV Vissim software (version 8, 64 bit) used for simulation. The design logic control dynamically adjusts signaling plans, determining the duration of the green interval for the secondary road based on arrival traffic flow. In the absence of traffic, it eliminates the green interval, advancing to the next phase, thereby reducing cycle time. This dynamic adjustment follows a conditional “if-then” statement, optimizing traffic signal operation. The design logic control algorithm was tested in a real isolation intersection with four scenarios, using non-linear traffic flow rate data for one peak hour. Results demonstrated that the proposed design logic control, based on the Semi-Actuated Traffic Signal Control (SATSC) approach, outperformed the commonly used Fixed-Time Signal Control (FTSC) with overall reduction of queue lengths by 39.6% and reduction of vehicle delays by 51.3%. The findings suggest its viability as a solution for many cities, contributing to a more sustainable traffic system. Full article
Show Figures

Figure 1

Figure 1
<p>Integration overall structure of concept algorithm for performance indicators. Note: The asterisk (*) is a technical symbol and is the replacement for any file name or it’s a shortcut for “any file”.</p>
Full article ">Figure 2
<p>Basic Operating Types of Traffic Signals Control.</p>
Full article ">Figure 3
<p>Illustration of two-phase signal, intersection geometry, and phase plan.</p>
Full article ">Figure 4
<p>Illustration of the change interval and clearance interval in the phase.</p>
Full article ">Figure 5
<p>Flow chart of SATSC approach with detectors on the side road. Note: The lines are used for drawing the algorithm, while the colors represent the green, yellow, and red intervals according to the phase control in the traffic light by applying the PTV Vissim software (version 8, 64 bit).</p>
Full article ">Figure 6
<p>Setting the initial determination the green interval and passage time according to demand.</p>
Full article ">Figure 7
<p>Setting the initial determination green interval and constant and passage time addition.</p>
Full article ">Figure 8
<p>Diagram of the interoperability principle among the Vissig, VisVAP, PTV Vissim [<a href="#B58-sustainability-16-02930" class="html-bibr">58</a>]. Note: The asterisk (*) is a technical symbol and is the replacement for any file name or it’s a shortcut for “any file”.</p>
Full article ">Figure 9
<p>Location by geoportal and design of intersection. Note: The arrows represent the directions of traffic flows, the lines depict horizontal road signaling, the green color indicates separating areas of movement directions, and the numbers (1, 2, 3, 4, 5, 6, 7, 8) represent lanes according to the geometry of the intersection.</p>
Full article ">Figure 10
<p>Quarter-hour traffic volumes for all scenarios.</p>
Full article ">Figure 11
<p>Observed hourly traffic volumes for all traffic scenarios.</p>
Full article ">Figure 12
<p>Car-following model by Wideman 74.</p>
Full article ">Figure 13
<p>Traffic model for the intersection at “Nena Tereza and Hajrullah Zymi”. Note:The colors represent the green, yellow, and red intervals according to the phase control in the traffic light by applying the PTV Vissim software (version 8, 64 bit).</p>
Full article ">Figure 14
<p>Signal plan for the FTSC strategy using Vissig tools within the framework of the PTV Vissim software version 8, 64-bit.</p>
Full article ">Figure 15
<p>Fixed-time signal program (<b>a</b>) Phase plan graph; (<b>b</b>) Signal plan in PTV Vissim. Note: On the left side of (<b>a</b>), the circles represent phases A, B, and C, while the dashed lines with arrows symbolize the transition from the current phase to the subsequent phase. Arrows with numbers (1,2,3,4,5,6,7,8) are provided within the phases to symbolize the directions of traffic flows. In (<b>b</b>), the graphical representation of the coordination plan according to signaling plans (SG1, SG2, SG3, and SG4) and according to the colors of the traffic light (green, yellow, red) is presented.</p>
Full article ">Figure 16
<p>Semi actuated-time signal program (<b>a</b>) Phase plan graph; (<b>b</b>) Signal plan in PTV Vissim. Note: On the left side of (<b>a</b>), the circles represent phases A, B, and C, while the dashed lines with arrows symbolize the transition from the current phase to the subsequent phase. Arrows with full line indicate the case where there is no detection of vehicles from the secondary road; in this case, Phase C directly transitions to Phase B, thus saving time and reducing the cycle. Within the phases, arrows with numbers (1, 2, 3, 4, 5, 6, 7, 8) are provided to symbolize the directions of traffic flows. In (<b>b</b>), the graphical representation of the coordination plan according to signaling plans (SG1, SG2, SG3, and SG4) and according to the colors of the traffic light (green, yellow, red) is presented.</p>
Full article ">Figure 17
<p>Logical control design in the *.pua and *.vap files in VisVAP for intersection.</p>
Full article ">Figure 18
<p>Queue length as a function of traffic flow for four scenarios and two strategies (FTSC and SATSC), as: (<b>a</b>) Scenario 1 (low traffic), (<b>b</b>) Scenario 2 (very high traffic), (<b>c</b>) Scenario 3 (high traffic), and (<b>d</b>) Scenario 4 (moderate traffic).</p>
Full article ">Figure 19
<p>Delays as a function of traffic flow for four scenarios and two strategies (FTSC and SATASC), as: as: (<b>a</b>) Scenario 1 (low traffic), (<b>b</b>) Scenario 2 (very high traffic), (<b>c</b>) Scenario 3 (high traffic), and (<b>d</b>) Scenario 4 (moderate traffic).</p>
Full article ">
35 pages, 961 KiB  
Article
Forester: Approximate Processing of an Imperative Procedure for Query-Time Exploratory Data Analysis in a Relational Database
by Md Arif Rahman and Young-Koo Lee
Electronics 2024, 13(4), 759; https://doi.org/10.3390/electronics13040759 - 14 Feb 2024
Viewed by 928
Abstract
Query-time Exploratory Data Analysis (qEDA) is an increasingly demanding aspect of the data analysis process that entails visually and quantitatively summarizing, comprehending, and interpreting the primary characteristics of a dataset. Nowadays, an imperative procedure is popular in relational databases for EDA because it [...] Read more.
Query-time Exploratory Data Analysis (qEDA) is an increasingly demanding aspect of the data analysis process that entails visually and quantitatively summarizing, comprehending, and interpreting the primary characteristics of a dataset. Nowadays, an imperative procedure is popular in relational databases for EDA because it enables us to write multiple dependent declarative queries with imperative logic. As online analytical processing (OLAP) systems contain extremely large datasets, data scientists often need quick visualizations of data, using approximate processing of imperative procedures, before analyzing them in their entirety. We identify gaps in the existing techniques, in that they are unable to sample both declarative-dependent statements and control logic at the same time and perform multi-dependent sampling-based approximate processing within the permitted time in qEDA. Traditional approximate query processing (AQP) involves tuple sampling for a single query approximation and enables queries to be executed over arbitrary random samples of tables. However, available AQP methods cannot produce a further representative sample of the data distribution for the dependent statements to estimate accurately and quickly for multiple dependent statements. On the other hand, sampling control structures, like loops and conditional statements, are discussed separately, without regard to the imperative structure of statements in a procedure. In this study, we propose Forester, a novel agile approximate processing method for imperative procedures that performs imperative program-aware sampling, which includes both statements with control regions (i.e., branch and loop) and processes them approximately within the permitted time in qEDA. Our method produces more targeted samples for each relation, while maintaining the data and control flow of dependent queries and imperative logic and determining all the conditions for a relation across all the statements in the sample that guarantee the existence of relevant data for dependent data distribution. Utilizing a workload of multi-statement imperative procedures from the Transaction Processing Performance Council Decision Support (TPC-DS) database, our experiment demonstrates that Forester outperforms the existing system in sampling, producing minimum error, and improving response time. Full article
Show Figures

Figure 1

Figure 1
<p>Comparative evaluation for approximate processing of an imperative procedure. (<b>a</b>) Control flow graph of a procedure. (<b>b</b>) Traditional approximate processing. (<b>c</b>) Proposed approximate processing.</p>
Full article ">Figure 2
<p>Example 1: an imperative procedure.</p>
Full article ">Figure 3
<p>An imperative procedure with imperative data and executable control region.</p>
Full article ">Figure 4
<p>Relational algebra for approximate processing of the procedure in the example.</p>
Full article ">Figure 5
<p>Forest representation for sampling in <span class="html-italic">Forester</span>.</p>
Full article ">Figure 6
<p>Forest data structure. (<b>a</b>) Data flow graph; (<b>b</b>) Four trees inside Forest.</p>
Full article ">Figure 7
<p>Forest and tree construction; (<b>a</b>) Forest construction; (<b>b</b>) Tree construction.</p>
Full article ">Figure 8
<p>MDL sampling.</p>
Full article ">Figure 9
<p>Sampling algebra for sampling expressions.</p>
Full article ">Figure 10
<p>Sampling expressions. (<b>a</b>) Expression for the statement with unary filters; (<b>b</b>) Expression for the statement with N-ary filters based on JOIN; (<b>c</b>) Expression for the statement with N-ary filters based on LEFT JOIN.</p>
Full article ">Figure 11
<p>Relational algebra for loop sampling. (<b>a</b>) Original loop statement; (<b>b</b>) Sampling loop.</p>
Full article ">Figure 12
<p>Agile approximate processing.</p>
Full article ">Figure 13
<p>Optimization process.</p>
Full article ">Figure 14
<p>Tuples removal at the higher sampling layers in <span class="html-italic">Forester</span>.</p>
Full article ">Figure 15
<p>Example 2: traditional approximate query processing for an imperative procedure.</p>
Full article ">Figure 16
<p>Overall performance evaluation. (<b>a</b>) Performance evaluation for accuracy; (<b>b</b>) Performance evaluation for speed-up; (<b>c</b>) Performance evaluation for speed-up using only cold sampling.</p>
Full article ">Figure 17
<p>MDL sampling evaluation.</p>
Full article ">Figure 18
<p>Compilation overhead of <span class="html-italic">Forester</span>.</p>
Full article ">Figure 19
<p>Evaluating the sample size sensitivity of <span class="html-italic">Forester</span>.</p>
Full article ">Figure 20
<p>Evaluating the projection sensitivity of <span class="html-italic">Forester</span>.</p>
Full article ">Figure 21
<p>Evaluating the scalability of <span class="html-italic">Forester</span>.</p>
Full article ">Figure 22
<p>Evaluating the parameter sensitivity of <span class="html-italic">Forester</span>.</p>
Full article ">
18 pages, 1810 KiB  
Article
A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation
by Ye Yuan, Yuliang Lu, Kailong Zhu, Hui Huang, Lu Yu and Jiazhen Zhao
Appl. Sci. 2023, 13(21), 11763; https://doi.org/10.3390/app132111763 - 27 Oct 2023
Cited by 2 | Viewed by 2126
Abstract
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use object-oriented database extensions. We propose a program transformation-based SQL [...] Read more.
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use object-oriented database extensions. We propose a program transformation-based SQL injection vulnerability detection method to address this issue. This method consists of two stages: program transformation and vulnerability detection. In the first stage, object-oriented database extensions are automatically transformed into semantically equivalent procedural database extensions through the identification of key statements, call relation verification, and program transformation. In the second stage, application programs are automatically scanned using a combination of control flow graph construction and taint analysis techniques to detect SQL injection vulnerabilities. Based on the proposed method, we have implemented the OODBE-SCAN prototype system and performed experimental analysis on eight modern PHP applications. We compare OODBE-SCAN with two related static analysis tools, RIPS and Seay. The results show that OODBE-SCAN can detect more real-world vulnerabilities and has higher accuracy than existing methods. Full article
Show Figures

Figure 1

Figure 1
<p>An example of an SQL injection attack against a web application that applies OODBE.</p>
Full article ">Figure 2
<p>The overall architecture of ODBE-SCAN.</p>
Full article ">Figure 3
<p>Comparison chart of real vulnerabilities detected by three tools in the dataset.</p>
Full article ">Figure 4
<p>Comparison chart of false positive detected by three tools in the dataset.</p>
Full article ">
16 pages, 269 KiB  
Article
Explain Trace: Misconceptions of Control-Flow Statements
by Oleg Sychev and Mikhail Denisov
Computers 2023, 12(10), 192; https://doi.org/10.3390/computers12100192 - 24 Sep 2023
Viewed by 1669
Abstract
Control-flow statements often cause misunderstandings among novice computer science students. To better address these problems, teachers need to know the misconceptions that are typical at this stage. In this paper, we present the results of studying students’ misconceptions about control-flow statements. We compiled [...] Read more.
Control-flow statements often cause misunderstandings among novice computer science students. To better address these problems, teachers need to know the misconceptions that are typical at this stage. In this paper, we present the results of studying students’ misconceptions about control-flow statements. We compiled 181 questions, each containing an algorithm written in pseudocode and the execution trace of that algorithm. Some of the traces were correct; others contained highlighted errors. The students were asked to explain in their own words why the selected line of the trace was correct or erroneous. We collected and processed 10,799 answers from 67 CS1 students. Among the 24 misconceptions we found, 6 coincided with misconceptions from other studies, and 7 were narrower cases of known misconceptions. We did not find previous research regarding 11 of the misconceptions we identified. Full article
(This article belongs to the Special Issue Future Trends in Computer Programming Education)
Show Figures

Figure 1

Figure 1
<p>Method flowchart: UML activity diagram of studying misconceptions from students’ responses.</p>
Full article ">Figure 2
<p>Example of the question about a selection statement with a correct trace.</p>
Full article ">Figure 3
<p>Example of the question about a loop with an incorrect trace.</p>
Full article ">
18 pages, 1553 KiB  
Article
A Novel Source Code Clone Detection Method Based on Dual-GCN and IVHFS
by Haixin Yang, Zhen Li and Xinyu Guo
Electronics 2023, 12(6), 1315; https://doi.org/10.3390/electronics12061315 - 9 Mar 2023
Cited by 1 | Viewed by 2611
Abstract
Source code clone detection, which can identify code fragments with similar functions, plays a significant role in software development and quality assurance. Existing methods either extract single syntactic or semantic information, or ignore the associated information between code statements in different structures. It [...] Read more.
Source code clone detection, which can identify code fragments with similar functions, plays a significant role in software development and quality assurance. Existing methods either extract single syntactic or semantic information, or ignore the associated information between code statements in different structures. It is difficult for these methods to effectively detect clone pairs with similar functions. In this paper, we propose a new model based on a dual graph convolutional network (GCN) and interval-valued hesitant fuzzy set (IVHFS), which we named DG-IVHFS. Specifically, we simplified and grouped the abstract syntax tree (AST) of source code to obtain the group representations. The group representations of the AST, as well as the control flow graph (CFG) representations, were transformed into graph structures, and then we applied GCNs on them to learn dependencies between nodes. In addition, we introduced IVHFS into the model for a more comprehensive evaluation of similarity. Our experimental results demonstrated that the precision, recall, and F1-scores of DG-IVHFS on the BigCloneBench and GoogleCodeJam datasets reached 98, 97 and 97% and 98, 93 and 95%, respectively, exceeding current state-of-the-art models. Moreover, our model performed well in terms of time consumption. Full article
(This article belongs to the Special Issue Machine Learning Methods in Software Engineering)
Show Figures

Figure 1

Figure 1
<p>The overall framework of our model based on dual graph convolutional networks and interval-valued hesitant fuzzy set: (<b>a</b>) generation of the initial syntax and semantics representations, (<b>b</b>) the dual graph convolutional networks capture the relationships between nodes and enhances the features and (<b>c</b>) feature fusion and similarity calculation processes of code fragments A and B.</p>
Full article ">Figure 2
<p>The original abstract syntax tree of code fragment <math display="inline"><semantics> <mrow> <mi>s</mi> <mi>u</mi> <mi>m</mi> <mo>_</mo> <mi>f</mi> <mi>u</mi> <mi>n</mi> <mn>1</mn> <mo>.</mo> <mi>j</mi> <mi>a</mi> <mi>v</mi> <mi>a</mi> </mrow> </semantics></math>. In the abstract syntax tree, the green, white and yellow boxes represent special attribute nodes, attribute nodes and code nodes, respectively. Too many attribute nodes in the tree result in overcomplexity of the tree structure.</p>
Full article ">Figure 3
<p>The simplifying and grouping process of the target abstract syntax tree. The attribute nodes are removed and the size of the tree is significantly reduced. <math display="inline"><semantics> <mrow> <mi>D</mi> <mi>e</mi> <mi>c</mi> <mi>l</mi> <mi>a</mi> <mi>r</mi> <mi>a</mi> <mi>t</mi> <mi>i</mi> <mi>o</mi> <mi>n</mi> </mrow> </semantics></math> or <math display="inline"><semantics> <mrow> <mi>S</mi> <mi>t</mi> <mi>a</mi> <mi>t</mi> <mi>e</mi> <mi>m</mi> <mi>e</mi> <mi>n</mi> <mi>t</mi> </mrow> </semantics></math> nodes and their leaf nodes are grouped into the same group. Dotted boxes with different colors indicate different groups.</p>
Full article ">Figure 4
<p>The generation process of group representation <math display="inline"><semantics> <mi mathvariant="bold">r</mi> </semantics></math>.</p>
Full article ">Figure 5
<p>The CFG of source code <math display="inline"><semantics> <mrow> <mi>s</mi> <mi>u</mi> <mi>m</mi> <mo>_</mo> <mi>f</mi> <mi>u</mi> <mi>n</mi> <mn>1</mn> <mo>.</mo> <mi>j</mi> <mi>a</mi> <mi>v</mi> <mi>a</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Schematic diagram of Formula (<a href="#FD9-electronics-12-01315" class="html-disp-formula">9</a>).</p>
Full article ">Figure 7
<p>Schematic diagram of Formula (<a href="#FD10-electronics-12-01315" class="html-disp-formula">10</a>).</p>
Full article ">Figure 8
<p>Time consumption of our model based on dual graph convolutional networks and interval-valued hesitant fuzzy set, as well as other baseline models in the training phase.</p>
Full article ">Figure 9
<p>Time consumption of our model based on dual graph convolutional networks and interval-valued hesitant fuzzy set, as well as other baseline models in the prediction phase.</p>
Full article ">Figure 10
<p>The feature concatenation process in Variant 5.</p>
Full article ">
25 pages, 2011 KiB  
Systematic Review
Effect of an (–)-Epicatechin Intake on Cardiometabolic Parameters—A Systematic Review of Randomized Controlled Trials
by Lisa Dicks, Zeina Haddad, Stefanie Deisling and Sabine Ellinger
Nutrients 2022, 14(21), 4500; https://doi.org/10.3390/nu14214500 - 26 Oct 2022
Cited by 2 | Viewed by 2484
Abstract
Growing evidence exists that consumption of cocoa-rich food improves the parameters of cardiometabolic health. These effects are ascribed to cocoa flavanols, particularly to (–)-epicatechin (EC), a natural ingredient of cocoa. Hence, to evaluate if EC may explain the effects of cocoa, this systematic [...] Read more.
Growing evidence exists that consumption of cocoa-rich food improves the parameters of cardiometabolic health. These effects are ascribed to cocoa flavanols, particularly to (–)-epicatechin (EC), a natural ingredient of cocoa. Hence, to evaluate if EC may explain the effects of cocoa, this systematic review aimed to provide an overview on randomized controlled trials (RCTs) investigating the impact of an EC intake on cardiometabolic biomarkers. For this, the Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) 2020 statement was considered and the risk of bias (RoB) was assessed by using the Cochrane RoB 2 tool. In total, 11 studies were included examining parameters on vascular function, glucose/lipid metabolism, oxidative stress, inflammation, appetite sensations, and body weight before and after EC treatment. Except for a dose-dependent acute increase in flow-mediated dilatation (FMD) and in the peripheral arterial tonometry (PAT) index in healthy young adults, effects by EC treatment were not observed. For most trials, some concerns exist for overall RoB. Thus, EC intake may improve endothelial function in healthy young adults. For further parameters (mostly secondary outcomes), it remains unclear if EC has no effect or if this was not detectable. Unbiased RCTs on the impact of an EC intake are needed, which should also investigate the additive or synergistic effects of EC with other cocoa ingredients. Full article
(This article belongs to the Section Phytochemicals and Human Health)
Show Figures

Figure 1

Figure 1
<p>Flow diagram of study selection process modified according to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 statement [<a href="#B19-nutrients-14-04500" class="html-bibr">19</a>].</p>
Full article ">Figure 2
<p>Results of the risk of bias assessment according to the revised Cochrane risk of bias 2 tool for randomized trials [<a href="#B21-nutrients-14-04500" class="html-bibr">21</a>]. + low risk, ? some concerns, – high risk. D1, bias arising from the randomization process; D2, bias due to deviations from intended interventions; D3, bias due to missing outcome data; D4, bias in measurement of the outcome; D5, bias in selection of reported result [<a href="#B20-nutrients-14-04500" class="html-bibr">20</a>,<a href="#B22-nutrients-14-04500" class="html-bibr">22</a>,<a href="#B23-nutrients-14-04500" class="html-bibr">23</a>,<a href="#B24-nutrients-14-04500" class="html-bibr">24</a>,<a href="#B25-nutrients-14-04500" class="html-bibr">25</a>,<a href="#B26-nutrients-14-04500" class="html-bibr">26</a>,<a href="#B27-nutrients-14-04500" class="html-bibr">27</a>,<a href="#B28-nutrients-14-04500" class="html-bibr">28</a>,<a href="#B29-nutrients-14-04500" class="html-bibr">29</a>,<a href="#B30-nutrients-14-04500" class="html-bibr">30</a>,<a href="#B31-nutrients-14-04500" class="html-bibr">31</a>].</p>
Full article ">
18 pages, 985 KiB  
Article
Operator & Fractional Order Based Nonlinear Robust Control for a Spiral Counter-Flow Heat Exchanger with Uncertainties and Disturbances
by Guanqiang Dong and Mingcong Deng
Machines 2022, 10(5), 335; https://doi.org/10.3390/machines10050335 - 4 May 2022
Cited by 2 | Viewed by 1763
Abstract
This paper studies operator and fractional order nonlinear robust control for a spiral counter-flow heat exchanger with uncertainties and disturbances. First, preliminary concepts are presented concerning fractional order derivative and calculus, fractional order operator theory. Then, the problem statement about nonlinear fractional order [...] Read more.
This paper studies operator and fractional order nonlinear robust control for a spiral counter-flow heat exchanger with uncertainties and disturbances. First, preliminary concepts are presented concerning fractional order derivative and calculus, fractional order operator theory. Then, the problem statement about nonlinear fractional order derivative equation with uncertainties is described. Third, the design of an operator fractional order controller and fractional order PID controller and determination of several related parameters is described. Simulations were performed to verify tracking and anti-disturbance performance by comparison to different control cases; verification is described and concluding remarks provided. Full article
Show Figures

Figure 1

Figure 1
<p>Right factorization of a nonlinear object.</p>
Full article ">Figure 2
<p>Right coprime factorization of a nonlinear system.</p>
Full article ">Figure 3
<p>Nonlinear operator-based feedback control system with uncertainty.</p>
Full article ">Figure 4
<p>Nonlinear operator-based feedback control system with uncertainties.</p>
Full article ">Figure 5
<p>FOPID controller.</p>
Full article ">Figure 6
<p>Operator-based fractional order robust control.</p>
Full article ">Figure 7
<p>Operator-based fractional order robust control with FOPID.</p>
Full article ">Figure 8
<p>Fractional order robust control with FOPID.</p>
Full article ">Figure 9
<p>Operator-based fractional order robust control with PID.</p>
Full article ">Figure 10
<p>Fractional order robust control with PID.</p>
Full article ">Figure 11
<p>Comparison of different control schemes.</p>
Full article ">Figure 12
<p>Simulation of operator control.</p>
Full article ">Figure 13
<p>Simulation of FOPID with operator.</p>
Full article ">Figure 14
<p>Simulation of FOPID without operator.</p>
Full article ">Figure 15
<p>Simulation of PID with operator.</p>
Full article ">Figure 16
<p>Simulation of PID without operator.</p>
Full article ">Figure A1
<p>A spiral heat exchanger plant.</p>
Full article ">Figure A2
<p>Cross-section of the inner structure of the spiral-plate heat exchanger.</p>
Full article ">
12 pages, 1219 KiB  
Article
A Retrospective Analysis of Randomized Controlled Trials on Traumatic Brain Injury: Evaluation of CONSORT Item Adherence
by Meltem Elcivan, Ana Kowark, Mark Coburn, Hussam Aldin Hamou, Benedikt Kremer, Hans Clusmann and Anke Höllig
Brain Sci. 2021, 11(11), 1504; https://doi.org/10.3390/brainsci11111504 - 13 Nov 2021
Cited by 3 | Viewed by 2413
Abstract
Traumatic brain injury (TBI) contributes to death and disability, resulting in an enormous individual and socio-economic challenges. Despite huge efforts, there are still controversies on treatment strategies and early outcome estimation. We evaluate current randomized controlled trials (RCTs) on TBI according to their [...] Read more.
Traumatic brain injury (TBI) contributes to death and disability, resulting in an enormous individual and socio-economic challenges. Despite huge efforts, there are still controversies on treatment strategies and early outcome estimation. We evaluate current randomized controlled trials (RCTs) on TBI according to their fulfillment of the CONSORT (Consolidated Statement of Reporting Trials) statement’s criteria as a marker of transparency and the quality of study planning and realization. A PubMed search for RCTs on TBI (January 2014–December 2019) was carried out. After screening of the abstracts (n = 1.926), the suitable full text manuscripts (n = 72) were assessed for the fulfillment of the CONSORT criteria. The mean ratio of consort statement fulfillment was 59% (±13%), 31% of the included studies (n = 22) complied with less than 50% of the CONSORT criteria. Citation frequency was moderately related to ratio of CONSORT item fulfillment (r = 0.4877; p < 0.0001) and citation frequency per year (r = 0.5249; p < 0.0001). The ratio of CONSORT criteria fulfillment was associated with the impact factor of the publishing journal (r = 0.6428; p < 0.0001). Essential data for study interpretation, such as sample size determination (item 7a), participant flow (item 13a) as well as losses and exclusions (item 13b), were only reported in 53%, 60% and 63%, respectively. Reporting and methodological aspects in RCTs on TBI still may be improved. Thus, the interpretation of study results may be hampered due to methodological weaknesses. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart of the studies included.</p>
Full article ">Figure 2
<p>CONSORT criteria fulfillment: (<b>left</b>) numbers of articles according to their CONSORT criteria fulfillment; (<b>right</b>) distribution of CONSORT criteria fulfillment.</p>
Full article ">Figure 3
<p>Correlation of citation frequency and CONSORT criteria fulfillment (<b>left</b>), citation frequency per year and CONSORT criteria fulfillment (<b>right</b>).</p>
Full article ">Figure 4
<p>Correlation of impact factor of the publishing journal and CONSORT criteria fulfillment.</p>
Full article ">
26 pages, 2207 KiB  
Article
Improving Comprehension: Intelligent Tutoring System Explaining the Domain Rules When Students Break Them
by Oleg Sychev, Nikita Penskoy, Anton Anikin, Mikhail Denisov and Artem Prokudin
Educ. Sci. 2021, 11(11), 719; https://doi.org/10.3390/educsci11110719 - 9 Nov 2021
Cited by 15 | Viewed by 3150
Abstract
Intelligent tutoring systems have become increasingly common in assisting students but are often aimed at isolated subject-domain tasks without creating a scaffolding system from lower- to higher-level cognitive skills, with low-level skills often neglected. We designed and developed an intelligent tutoring system, CompPrehension, [...] Read more.
Intelligent tutoring systems have become increasingly common in assisting students but are often aimed at isolated subject-domain tasks without creating a scaffolding system from lower- to higher-level cognitive skills, with low-level skills often neglected. We designed and developed an intelligent tutoring system, CompPrehension, which aims to improve the comprehension level of Bloom’s taxonomy. The system features plug-in-based architecture, easily adding new subject domains and learning strategies. It uses formal models and software reasoners to solve the problems and judge the answers, and generates explanatory feedback about the broken domain rules and follow-up questions to stimulate the students’ thinking. We developed two subject domain models: an Expressions domain for teaching the expression order of evaluation, and a Control Flow Statements domain for code-tracing tasks. The chief novelty of our research is that the developed models are capable of automatic problem classification, determining the knowledge required to solve them and so the pedagogical conditions to use the problem without human participation. More than 100 undergraduate first-year Computer Science students took part in evaluating the system. The results in both subject domains show medium but statistically significant learning gains after using the system for a few days; students with worse previous knowledge gained more. In the Control Flow Statements domain, the number of completed questions correlates positively with the post-test grades and learning gains. The students’ survey showed a slightly positive perception of the system. Full article
(This article belongs to the Special Issue Learner–Computer Interaction and Intelligent Tutoring Systems)
Show Figures

Figure 1

Figure 1
<p>CompPrehension architecture as a UML component diagram.</p>
Full article ">Figure 2
<p>Exclusive reasoning time for the Control Flow Statements domain.</p>
Full article ">Figure 3
<p>Exclusive reasoning time for the Expressions domain.</p>
Full article ">Figure 4
<p>Workflow for CompPrehension system.</p>
Full article ">Figure 5
<p>Control Flow Statements domain model: partial hierarchy of concepts for algorithmic structures.</p>
Full article ">Figure 6
<p>Control Flow Statements domain model: partial hierarchy of concepts for algorithm’s trace.</p>
Full article ">Figure 7
<p>Question example: the algorithm and the partial trace with an error.</p>
Full article ">Figure 8
<p>Expression evaluation order as a graph.</p>
Full article ">Figure 9
<p>Expression evaluation domain: error messages.</p>
Full article ">Figure 10
<p>Expressions domain: an example of a follow-up question.</p>
Full article ">Figure 11
<p>Partial follow-up questions diagram: operator precedence and associativity.</p>
Full article ">Figure 12
<p>Histogram of the pre-test grades and post-test grades in the Expressions domain.</p>
Full article ">Figure 13
<p>Histogram of the pre-test grades and post-test grades in the Control Flow Statements domain.</p>
Full article ">
14 pages, 3254 KiB  
Article
Adaptive Supply Chain: Demand–Supply Synchronization Using Deep Reinforcement Learning
by Zhandos Kegenbekov and Ilya Jackson
Algorithms 2021, 14(8), 240; https://doi.org/10.3390/a14080240 - 15 Aug 2021
Cited by 29 | Viewed by 7247
Abstract
Adaptive and highly synchronized supply chains can avoid a cascading rise-and-fall inventory dynamic and mitigate ripple effects caused by operational failures. This paper aims to demonstrate how a deep reinforcement learning agent based on the proximal policy optimization algorithm can synchronize inbound and [...] Read more.
Adaptive and highly synchronized supply chains can avoid a cascading rise-and-fall inventory dynamic and mitigate ripple effects caused by operational failures. This paper aims to demonstrate how a deep reinforcement learning agent based on the proximal policy optimization algorithm can synchronize inbound and outbound flows and support business continuity operating in the stochastic and nonstationary environment if end-to-end visibility is provided. The deep reinforcement learning agent is built upon the Proximal Policy Optimization algorithm, which does not require hardcoded action space and exhaustive hyperparameter tuning. These features, complimented with a straightforward supply chain environment, give rise to a general and task unspecific approach to adaptive control in multi-echelon supply chains. The proposed approach is compared with the base-stock policy, a well-known method in classic operations research and inventory control theory. The base-stock policy is prevalent in continuous-review inventory systems. The paper concludes with the statement that the proposed solution can perform adaptive control in complex supply chains. The paper also postulates fully fledged supply chain digital twins as a necessary infrastructural condition for scalable real-world applications. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>Agent–environment relations in a Markov decision process.</p>
Full article ">Figure 2
<p>Supply chain with <span class="html-italic">m</span> stages.</p>
Full article ">Figure 3
<p>Learning curve. The PPO agent performance is measured by reward increases during training episodes.</p>
Full article ">Figure 4
<p>Inventory dynamics under the control of the trained PPO agent during the first experiment.</p>
Full article ">Figure 5
<p>Inventory dynamics under the control of the base-stock policy during the first experiment.</p>
Full article ">Figure 6
<p>The PPO agent decisively outcompetes the base-stock policy under more challenging environment settings.</p>
Full article ">Figure 7
<p>Unusual inventory dynamics under the control of the PPO agent during the third experiment.</p>
Full article ">Figure 8
<p>The PPO agent outcompetes the baseline base-stock policy by discovering a solution that exploits the simulation mechanics.</p>
Full article ">
11 pages, 1165 KiB  
Article
Evaluation of Choroidal Melanoma Vascularization by Color Doppler Flow Imaging: An Option for Follow-Up Tumor Control Assessment after CyberKnife®?
by Cinja Kaak, Vinodh Kakkassery, Björn O. Scheef, Marco Zschoche, Felix Rommel, Guido Hildebrandt, Steffen Emmert, Christian Junghanß, Rudolf F. Guthoff, Anselm M. Jünemann and Uwe Walter
Medicina 2021, 57(6), 553; https://doi.org/10.3390/medicina57060553 - 31 May 2021
Cited by 3 | Viewed by 2326
Abstract
Background and Objectives: Thus far, tumor control for choroidal melanoma after teletherapeutic radiation is clinically difficult. In contrast to brachytherapy, the tumor height does not necessarily have to shrink as a result of teletherapy. Therefore, the objective of this study was to [...] Read more.
Background and Objectives: Thus far, tumor control for choroidal melanoma after teletherapeutic radiation is clinically difficult. In contrast to brachytherapy, the tumor height does not necessarily have to shrink as a result of teletherapy. Therefore, the objective of this study was to evaluate tumor vascularization determined by color Doppler flow imaging (CDFI) as a possible approach for monitoring the therapy response after teletherapy of choroidal melanoma. Materials and Methods: A single-center retrospective pilot study of 24 patients was conducted, all of whom had been diagnosed with choroidal neoplasm, treated and followed up. Besides tumor vascularization, the following parameters were collected: age, gender, tumor entity, location, radiation dose, knowledge of relapse, tumor height, radiation-related complications, occurrence of metastases, visual acuity in logMAR. Results: The level of choroidal melanoma vascularization markedly decreased in all included subjects after treatment with the CyberKnife® technology. Initially, the level of vascularization was 2.1 (SD: 0.76 for n = 10); post-therapeutically, it averaged 0.14 (SD: 0.4). Regarding the tumor apex, CDFI sonography also demonstrated a significant tumor regression (mean value pre-therapeutically: 8.35 mm—SD: 3.92 for n = 10; mean value post-therapeutically: 4.86 mm—SD: 3.21). The level of choroidal melanoma vascularization declined in the patient collective treated with ruthenium-106 brachytherapy. The pre-therapeutic level of vascularization of 2 (SD: 0 for n = 2) decreased significantly to a level of 0 (mean: 0—SD: 0). The tumor height determined by CDFI did not allow any valid statement regarding local tumor control. In contrast to these findings, the patient population of the control group without any radiation therapy did not show any alterations in vascularization. Conclusions: Our data suggest that the determination of the tumor vascularization level using CDFI might be a useful and supplementary course parameter in the follow-up care of choroidal melanoma to monitor the success of treatment. This especially applies to robot-assisted radiotherapy using CyberKnife®. Further studies are necessary to validate the first results of this assessment. Full article
(This article belongs to the Section Ophthalmology)
Show Figures

Figure 1

Figure 1
<p>Color Doppler flow imaging of choroidal melanoma before and after therapy. (<b>A</b>) Patient with a large choroidal melanoma at inferior nasal location of left eye. Note the high degree of intra-tumor vascularization (level 3). The insert in the lower part shows the CDFI flow curve and indices of a prominent intra-tumor artery. (<b>B</b>) Choroidal melanoma 3 months after CyberKnife<sup>®</sup> therapy in the same patient as shown in (<b>A</b>). Note the complete loss of intra-tumor vascularization (level 0), with visibility only of sub-retinal vessels. (<b>C</b>) Patient with a small choroidal melanoma at temporal location of right eye. Note the prominent singular intra-tumor artery (vascularization level 2). The insert in the lower part shows the CDFI flow curve of the intra-tumor artery. (<b>D</b>) Choroidal melanoma 12 months after CyberKnife<sup>®</sup> therapy in the same patient as shown in (<b>C</b>). Note the nearly complete loss of intra-tumor vascularization (level 1), with visibility only of a low-flow intra-tumor artery.</p>
Full article ">Figure 2
<p>Course of tumor vascularization during treatment. (<b>a</b>) shows the course of choroidal melanoma vascularization using CDFIy in patients treated with CyberKnife<sup>®</sup>. (<b>b</b>) shows the course of choroidal melanoma vascularization using CDFI in patients treated with ruthenium-106 brachytherapy.</p>
Full article ">Figure 3
<p>Course of tumor height during treatment. (<b>a</b>) shows the course of tumor prominence during treatment using CDFI in patients treated with CyberKnife<sup>®</sup>. (<b>b</b>) The figure shows the course of tumor prominence during treatment using bulbar sonography in patients treated with CyberKnife<sup>®</sup>. (<b>c</b>) The figure shows the course of tumor prominence during treatment using CDFI in patients treated with ruthenium-106 brachytherapy. (<b>d</b>) The figure shows the course of tumor prominence during treatment using bulbar sonography in patients treated with ruthenium-106 brachytherapy.</p>
Full article ">
22 pages, 2275 KiB  
Article
Optimal Control of an Ultraviolet Water Disinfection System
by Viorel MINZU, Saïd RIAHI and Eugen RUSU
Appl. Sci. 2021, 11(6), 2638; https://doi.org/10.3390/app11062638 - 16 Mar 2021
Cited by 13 | Viewed by 2155
Abstract
The ultraviolet water disinfection process has numerous advantages in comparison with other water treatments. This study deals with this process’s optimal control and presents all its stages, from problem statement to analysis of results. We consider a typical disinfection water system and data [...] Read more.
The ultraviolet water disinfection process has numerous advantages in comparison with other water treatments. This study deals with this process’s optimal control and presents all its stages, from problem statement to analysis of results. We consider a typical disinfection water system and data presented in the literature. In this case, the control inputs are the water flow rate and the UV light intensity. A nonlinear dynamic model for the UV disinfection system is constructed and generates a method to calculate the bacterial reduction. An optimal control problem (OCP) is stated using the dynamic model and two optimal criteria: the disinfection and energy criterion. The optimal solutions are yielded by a metaheuristic algorithm based on hybrid topology particle swarm optimization. The algorithm determines the optimal flow rate and light intensity for an imposed bacterial reduction. The implemented program was carried out for a wide range of input values for comprehensive analysis. The analysis of the results establishes when an optimal solution exists and the extent to which the disinfection or energy criterion is fulfilled. The method to calculate the bacterial reduction, OCP statement, optimization algorithm, and results’ analysis may be considered findings of this work. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Schematic representation of the UV disinfection system.</p>
Full article ">Figure 2
<p>Input and output variables of the UV disinfection system’ model.</p>
Full article ">Figure 3
<p>The computation of the bacterial abatement.</p>
Full article ">Figure 4
<p>Static gains generation using procedure <span class="html-italic">A</span>(<span class="html-italic">I</span><sub>0</sub>, <span class="html-italic">Q</span><sub>0</sub>, <span class="html-italic">t</span>).</p>
Full article ">Figure 5
<p>Typical evolution of variables during the execution of algorithm HTPSO_UV1 for the imposed values of two bacterial abatements: (<b>a</b>) A<sub>0</sub> = 3; (<b>b</b>) A<sub>0</sub> = 3.5.</p>
Full article ">Figure 6
<p>Optimal solutions as functions of <span class="html-italic">A</span><sub>0.</sub></p>
Full article ">Figure 7
<p>Optimal solutions with an imposed flow rate: (<b>a</b>) Q<sub>0</sub> = 0.2; (<b>b</b>) Q<sub>0</sub> = 0.4.</p>
Full article ">Figure 8
<p>Optimal solutions with an imposed UV intensity: (<b>a</b>) I<sub>0</sub> = 5; (<b>b</b>) I<sub>0</sub> = 7.9</p>
Full article ">Figure A1
<p>Comparison between characteristic curves: (<b>a</b>) experimental data; (<b>b</b>) parametrized curves</p>
Full article ">
Back to TopTop